Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-9947 (GCVE-0-2020-9947)
Vulnerability from cvelistv5
- Processing maliciously crafted web content may lead to arbitrary code execution
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Apple | tvOS |
Version: unspecified < 14.0 |
||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:50:57.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT211843" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT211850" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT211844" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT211935" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT211952" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT211845" }, { "name": "[oss-security] 20210322 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0002", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/03/22/1" }, { "name": "GLSA-202104-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202104-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "tvOS", "vendor": "Apple", "versions": [ { "lessThan": "14.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "watchOS", "vendor": "Apple", "versions": [ { "lessThan": "7.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Safari", "vendor": "Apple", "versions": [ { "lessThan": "14.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "iOS and iPadOS", "vendor": "Apple", "versions": [ { "lessThan": "14.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "iCloud for Windows", "vendor": "Apple", "versions": [ { "lessThan": "11.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "iTunes for Windows", "vendor": "Apple", "versions": [ { "lessThan": "12.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 7.0, iOS 14.0 and iPadOS 14.0, iTunes for Windows 12.10.9, iCloud for Windows 11.5, tvOS 14.0, Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Processing maliciously crafted web content may lead to arbitrary code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-01T01:06:24", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT211843" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT211850" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT211844" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT211935" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT211952" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT211845" }, { "name": "[oss-security] 20210322 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0002", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/03/22/1" }, { "name": "GLSA-202104-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202104-03" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2020-9947", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "tvOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "14.0" } ] } }, { "product_name": "watchOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.0" } ] } }, { "product_name": "Safari", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "14.0" } ] } }, { "product_name": "iOS and iPadOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "14.0" } ] } }, { "product_name": "iCloud for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "11.5" } ] } }, { "product_name": "iTunes for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "12.10" } ] } } ] }, "vendor_name": "Apple" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 7.0, iOS 14.0 and iPadOS 14.0, iTunes for Windows 12.10.9, iCloud for Windows 11.5, tvOS 14.0, Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Processing maliciously crafted web content may lead to arbitrary code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/en-us/HT211843", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211843" }, { "name": "https://support.apple.com/en-us/HT211850", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211850" }, { "name": "https://support.apple.com/en-us/HT211844", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211844" }, { "name": "https://support.apple.com/en-us/HT211935", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211935" }, { "name": "https://support.apple.com/en-us/HT211952", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211952" }, { "name": "https://support.apple.com/en-us/HT211845", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211845" }, { "name": "[oss-security] 20210322 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0002", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/22/1" }, { "name": "GLSA-202104-03", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202104-03" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2020-9947", "datePublished": "2020-12-08T19:21:36", "dateReserved": "2020-03-02T00:00:00", "dateUpdated": "2024-08-04T10:50:57.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-9947\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2020-12-08T20:15:16.713\",\"lastModified\":\"2024-11-21T05:41:34.753\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 7.0, iOS 14.0 and iPadOS 14.0, iTunes for Windows 12.10.9, iCloud for Windows 11.5, tvOS 14.0, Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.\"},{\"lang\":\"es\",\"value\":\"Se abord\u00f3 un problema de uso de la memoria previamente liberada con una administraci\u00f3n de la memoria mejorada. Este problema se corrigi\u00f3 en watchOS versi\u00f3n 7.0, iOS versi\u00f3n 14.0 e iPadOS versi\u00f3n 14.0, iTunes para Windows versi\u00f3n 12.10.9, iCloud para Windows versi\u00f3n 11.5, tvOS versi\u00f3n 14.0, Safari versi\u00f3n 14.0. Un procesamiento de contenido web malicioso puede conllevar a una ejecuci\u00f3n de c\u00f3digo arbitraria\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*\",\"versionEndExcluding\":\"11.5.0\",\"matchCriteriaId\":\"83F73A4A-BF43-4F89-812D-FBDD33CDEF44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.10.9\",\"matchCriteriaId\":\"599D94C6-FD19-4848-8037-D298B331DE16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"14.0\",\"matchCriteriaId\":\"8DE1F811-8D4C-4C36-82DB-FE761C07FD0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"14.0\",\"matchCriteriaId\":\"10CC9ED4-9AE1-415A-94FF-60CB209506CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"14.0\",\"matchCriteriaId\":\"16AF4D2F-3C55-4DCC-A253-3F8CB4F453EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"14.0\",\"matchCriteriaId\":\"0D16EC4D-D2E7-476D-BFBC-3703C8F0B45E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"7.0\",\"matchCriteriaId\":\"C117BCCF-7789-40BB-AD25-1E712F6DCF7C\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/03/22/1\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202104-03\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT211843\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT211844\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT211845\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT211850\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT211935\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT211952\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/03/22/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202104-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT211843\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT211844\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT211845\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT211850\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT211935\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT211952\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]}]}}" } }
var-202012-1515
Vulnerability from variot
A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 7.0, iOS 14.0 and iPadOS 14.0, iTunes for Windows 12.10.9, iCloud for Windows 11.5, tvOS 14.0, Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of RenderObject objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. WebKit for Apple is the American Apple ( Apple ) is an efficient and stable open source browser engine from the company. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0
iOS 14.0 and iPadOS 14.0 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT211850.
AppleAVD Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: An application may be able to cause unexpected system termination or write kernel memory Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-9958: Mohamed Ghannam (@_simo36)
Assets Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: An attacker may be able to misuse a trust relationship to download malicious content Description: A trust issue was addressed by removing a legacy API. CVE-2020-9979: CodeColorist of LightYear Security Lab of AntGroup Entry updated November 12, 2020
Audio Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: A malicious application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9943: JunDong Xie of Ant Group Light-Year Security Lab Entry added November 12, 2020
Audio Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9944: JunDong Xie of Ant Group Light-Year Security Lab Entry added November 12, 2020
CoreAudio Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: Playing a malicious audio file may lead to arbitrary code execution Description: A buffer overflow issue was addressed with improved memory handling. CVE-2020-9954: Francis working with Trend Micro Zero Day Initiative, JunDong Xie of Ant Group Light-Year Security Lab Entry added November 12, 2020
CoreCapture Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2020-9949: Proteas Entry added November 12, 2020
Disk Images Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-9965: Proteas CVE-2020-9966: Proteas Entry added November 12, 2020
Icons Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: A malicious application may be able to identify what other applications a user has installed Description: The issue was addressed with improved handling of icon caches. CVE-2020-9773: Chilik Tamir of Zimperium zLabs
IDE Device Support Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: An attacker in a privileged network position may be able to execute arbitrary code on a paired device during a debug session over the network Description: This issue was addressed by encrypting communications over the network to devices running iOS 14, iPadOS 14, tvOS 14, and watchOS 7. CVE-2020-9992: Dany Lisiansky (@DanyL931), Nikias Bassen of Zimperium zLabs Entry updated September 17, 2020
ImageIO Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-9961: Xingwei Lin of Ant Security Light-Year Lab Entry added November 12, 2020
ImageIO Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-9876: Mickey Jin of Trend Micro Entry added November 12, 2020
IOSurfaceAccelerator Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: A local user may be able to read kernel memory Description: A memory initialization issue was addressed with improved memory handling. CVE-2020-9964: Mohamed Ghannam (@_simo36), Tommy Muir (@Muirey03)
Kernel Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: An attacker in a privileged network position may be able to inject into active connections within a VPN tunnel Description: A routing issue was addressed with improved restrictions. CVE-2019-14899: William J. Tolley, Beau Kujath, and Jedidiah R. Crandall Entry added November 12, 2020
Keyboard Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: A malicious application may be able to leak sensitive user information Description: A logic issue was addressed with improved state management. CVE-2020-9976: Rias A. Sherzad of JAIDE GmbH in Hamburg, Germany
libxml2 Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: Processing a maliciously crafted file may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2020-9981: found by OSS-Fuzz Entry added November 12, 2020
Mail Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: A remote attacker may be able to unexpectedly alter application state Description: This issue was addressed with improved checks. CVE-2020-9941: Fabian Ising of FH Münster University of Applied Sciences and Damian Poddebniak of FH Münster University of Applied Sciences Entry added November 12, 2020
Messages Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: A local user may be able to discover a user’s deleted messages Description: The issue was addressed with improved deletion. CVE-2020-9988: William Breuer of the Netherlands CVE-2020-9989: von Brunn Media Entry added November 12, 2020
Model I/O Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-13520: Aleksandar Nikolic of Cisco Talos Entry added November 12, 2020
Model I/O Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution Description: A buffer overflow issue was addressed with improved memory handling. CVE-2020-6147: Aleksandar Nikolic of Cisco Talos CVE-2020-9972: Aleksandar Nikolic of Cisco Talos Entry added November 12, 2020
Model I/O Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9973: Aleksandar Nikolic of Cisco Talos
NetworkExtension Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: A malicious application may be able to elevate privileges Description: A use after free issue was addressed with improved memory management. CVE-2020-9996: Zhiwei Yuan of Trend Micro iCore Team, Junzhi Lu and Mickey Jin of Trend Micro Entry added November 12, 2020
Phone Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: The screen lock may not engage after the specified time period Description: This issue was addressed with improved checks. CVE-2020-9946: Daniel Larsson of iolight AB
Quick Look Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: A malicious app may be able to determine the existence of files on the computer Description: The issue was addressed with improved handling of icon caches. CVE-2020-9963: Csaba Fitzl (@theevilbit) of Offensive Security Entry added November 12, 2020
Safari Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: A malicious application may be able to determine a user's open tabs in Safari Description: A validation issue existed in the entitlement verification. CVE-2020-9977: Josh Parnham (@joshparnham) Entry added November 12, 2020
Safari Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: Visiting a malicious website may lead to address bar spoofing Description: The issue was addressed with improved UI handling. CVE-2020-9993: Masato Sugiyama (@smasato) of University of Tsukuba, Piotr Duszynski Entry added November 12, 2020
Sandbox Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: A local user may be able to view senstive user information Description: An access issue was addressed with additional sandbox restrictions. CVE-2020-9969: Wojciech Reguła of SecuRing (wojciechregula.blog) Entry added November 12, 2020
Sandbox Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: A malicious application may be able to access restricted files Description: A logic issue was addressed with improved restrictions. CVE-2020-9968: Adam Chester (@xpn) of TrustedSec Entry updated September 17, 2020
Siri Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: A person with physical access to an iOS device may be able to view notification contents from the lockscreen Description: A lock screen issue allowed access to messages on a locked device. CVE-2020-9959: an anonymous researcher, an anonymous researcher, an anonymous researcher, an anonymous researcher, an anonymous researcher, Andrew Goldberg The University of Texas at Austin, McCombs School of Business, Meli̇h Kerem Güneş of Li̇v College, Sinan Gulguler
SQLite Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: A remote attacker may be able to cause a denial of service Description: This issue was addressed with improved checks. CVE-2020-13434 CVE-2020-13435 CVE-2020-9991 Entry added November 12, 2020
SQLite Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: A remote attacker may be able to leak memory Description: An information disclosure issue was addressed with improved state management. CVE-2020-9849 Entry added November 12, 2020
SQLite Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: Multiple issues in SQLite Description: Multiple issues were addressed by updating SQLite to version 3.32.3. CVE-2020-15358 Entry added November 12, 2020
SQLite Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: A maliciously crafted SQL query may lead to data corruption Description: This issue was addressed with improved checks. CVE-2020-13631 Entry added November 12, 2020
SQLite Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: A remote attacker may be able to cause arbitrary code execution Description: A memory corruption issue was addressed with improved state management. CVE-2020-13630 Entry added November 12, 2020
WebKit Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2020-9947: cc working with Trend Micro Zero Day Initiative CVE-2020-9950: cc working with Trend Micro Zero Day Initiative CVE-2020-9951: Marcin 'Icewall' Noga of Cisco Talos Entry added November 12, 2020
WebKit Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: Processing maliciously crafted web content may lead to code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-9983: zhunki Entry added November 12, 2020
WebKit Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: Processing maliciously crafted web content may lead to a cross site scripting attack Description: An input validation issue was addressed with improved input validation. CVE-2020-9952: Ryan Pickren (ryanpickren.com)
Wi-Fi Available for: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A logic issue was addressed with improved state management. CVE-2020-10013: Yu Wang of Didi Research America Entry added November 12, 2020
Additional recognition
App Store We would like to acknowledge Giyas Umarov of Holmdel High School for their assistance.
Audio We would like to acknowledge JunDong Xie and XingWei Lin of Ant- financial Light-Year Security Lab for their assistance. Entry added November 12, 2020
Bluetooth We would like to acknowledge Andy Davis of NCC Group and Dennis Heinze (@ttdennis) of TU Darmstadt, Secure Mobile Networking Lab for their assistance.
CallKit We would like to acknowledge Federico Zanetello for their assistance.
CarPlay We would like to acknowledge an anonymous researcher for their assistance.
Clang We would like to acknowledge Brandon Azad of Google Project Zero for their assistance. Entry added November 12, 2020
Core Location We would like to acknowledge Yiğit Can YILMAZ (@yilmazcanyigit) for their assistance.
debugserver We would like to acknowledge Linus Henze (pinauten.de) for their assistance.
iAP We would like to acknowledge Andy Davis of NCC Group for their assistance.
iBoot We would like to acknowledge Brandon Azad of Google Project Zero for their assistance.
Kernel We would like to acknowledge Brandon Azad of Google Project Zero, Stephen Röttger of Google for their assistance. Entry updated November 12, 2020
libarchive We would like to acknowledge Dzmitry Plotnikau and an anonymous researcher for their assistance.
lldb We would like to acknowledge Linus Henze (pinauten.de) for their assistance. Entry added November 12, 2020
Location Framework We would like to acknowledge Nicolas Brunner (linkedin.com/in/nicolas-brunner-651bb4128) for their assistance. Entry updated October 19, 2020
Mail We would like to acknowledge an anonymous researcher for their assistance. Entry added November 12, 2020
Mail Drafts We would like to acknowledge Jon Bottarini of HackerOne for their assistance. Entry added November 12, 2020
Maps We would like to acknowledge Matthew Dolan of Amazon Alexa for their assistance.
NetworkExtension We would like to acknowledge Thijs Alkemade of Computest and ‘Qubo Song’ of ‘Symantec, a division of Broadcom’ for their assistance.
Phone Keypad We would like to acknowledge Hasan Fahrettin Kaya of Akdeniz University, an anonymous researcher for their assistance. Entry updated November 12, 2020
Safari We would like to acknowledge Andreas Gutmann (@KryptoAndI) of OneSpan's Innovation Centre (onespan.com) and University College London, Steven J. Murdoch (@SJMurdoch) of OneSpan's Innovation Centre (onespan.com) and University College London, Jack Cable of Lightning Security, Ryan Pickren (ryanpickren.com), Yair Amit for their assistance. Entry added November 12, 2020
Safari Reader We would like to acknowledge Zhiyang Zeng(@Wester) of OPPO ZIWU Security Lab for their assistance. Entry added November 12, 2020
Security We would like to acknowledge Christian Starkjohann of Objective Development Software GmbH for their assistance. Entry added November 12, 2020
Status Bar We would like to acknowledge Abdul M. Majumder, Abdullah Fasihallah of Taif university, Adwait Vikas Bhide, Frederik Schmid, Nikita, and an anonymous researcher for their assistance.
Telephony We would like to acknowledge Onur Can Bıkmaz, Vodafone Turkey @canbkmaz, Yiğit Can YILMAZ (@yilmazcanyigit), an anonymous researcher for their assistance. Entry updated November 12, 2020
UIKit We would like to acknowledge Borja Marcos of Sarenet, Simon de Vegt, and Talal Haj Bakry (@hajbakri) and Tommy Mysk (@tommymysk) of Mysk Inc for their assistance.
Web App We would like to acknowledge Augusto Alvarez of Outcourse Limited for their assistance.
WebKit We would like to acknowledge Pawel Wylecial of REDTEAM.PL, Ryan Pickren (ryanpickren.com), Tsubasa FUJII (@reinforchu), Zhiyang Zeng(@Wester) of OPPO ZIWU Security Lab for their assistance. Entry added November 12, 2020
Installation note:
This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/
iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
- Navigate to Settings
- Select General
- Select About. The version after applying this update will be "iOS 14.0 and iPadOS 14.0".
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEbURczHs1TP07VIfuZcsbuWJ6jjAFAl+uxqgACgkQZcsbuWJ6 jjBhIhAAhLzDSjgjVzG0JLzEerhFBcAWQ1G8ogmIdxuC0aQfvxO4V1NriKzUcmsZ UgQCEdN4kzfLsj3KeuwSeq0pg2CX1eZdgY/FyuOBRzljsmGPXJgkyYapJww6mC8n 7jeJazKusiyaRmScLYDwvbOQGlaqCfu6HrM9umMpLfwPGjFqe/gz8jyxohdVZx9t pNC0g9l37dVJIvFRc1mAm9HAnIQoL8CDOEd96jVYiecB8xk0X6CwjZ7nGzYJc5LZ A54EaN0dDz+8q8jgylmAd8xkA8Pgdsxw+LWDr1TxPuu3XIzYa98S1AsItK2eiWx8 pIhrzVZ3fk1w3+W/cSWrgzUq4ouijWcWw9dmVgxmzv9ldL/pS+wIgFsYLJm4xHAp PH+9p3JmMQks9BWgr3h+NEcJwCUm5J7y0PNuCnQL2iKzn4jikqgfCXHZOidkPV3t KjeeIFX30AGI7cUqhRl9GbRn8l5SA4pbd4a0Y5df1PgkDjSXxw91Z1+5S15Qfrzs K8pBlPH37yU3aqMEvxBsN5Fd7vdFdA+pV/aWG5tw4pUlZJC25c50w1ZW0vrnsisg /isPJqXhUWiGAfQ7s5W6W3AMs4PyvRjY+7zzGiHAd+wNkUNwVTbXvKP4W4n/vGH8 uARpQRQsureymLerXpVTwH8ZoeDEeZZwaqNHTQKg/M9ifAZPZUA= =WdqR -----END PGP SIGNATURE-----
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202104-03
https://security.gentoo.org/
Severity: Normal Title: WebkitGTK+: Multiple vulnerabilities Date: April 30, 2021 Bugs: #770793, #773193 ID: 202104-03
Synopsis
Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
Background
WebKitGTK+ is a full-featured port of the WebKit rendering engine, suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-libs/webkit-gtk < 2.30.6 >= 2.30.6
Description
Multiple vulnerabilities have been discovered in WebkitGTK+. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All WebkitGTK+ users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.30.6"
References
[ 1 ] CVE-2020-13558 https://nvd.nist.gov/vuln/detail/CVE-2020-13558 [ 2 ] CVE-2020-27918 https://nvd.nist.gov/vuln/detail/CVE-2020-27918 [ 3 ] CVE-2020-29623 https://nvd.nist.gov/vuln/detail/CVE-2020-29623 [ 4 ] CVE-2020-9947 https://nvd.nist.gov/vuln/detail/CVE-2020-9947 [ 5 ] CVE-2021-1765 https://nvd.nist.gov/vuln/detail/CVE-2021-1765 [ 6 ] CVE-2021-1789 https://nvd.nist.gov/vuln/detail/CVE-2021-1789 [ 7 ] CVE-2021-1799 https://nvd.nist.gov/vuln/detail/CVE-2021-1799 [ 8 ] CVE-2021-1801 https://nvd.nist.gov/vuln/detail/CVE-2021-1801 [ 9 ] CVE-2021-1870 https://nvd.nist.gov/vuln/detail/CVE-2021-1870 [ 10 ] WSA-2021-0001 https://webkitgtk.org/security/WSA-2021-0001.html [ 11 ] WSA-2021-0002 https://webkitgtk.org/security/WSA-2021-0002.html
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202104-03
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2021 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5 .
Alternatively, on your watch, select "My Watch > General > About"
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202012-1515", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tvos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "14.0" }, { "model": "safari", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "14.0" }, { "model": "itunes", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "12.10.9" }, { "model": "ipados", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "14.0" }, { "model": "watchos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "7.0" }, { "model": "itunes", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "12.0.0" }, { "model": "iphone os", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "14.0" }, { "model": "icloud", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "11.5.0" }, { "model": "ipados", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "watchos", "scope": "lt", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": "(apple watch series 3 or later )" }, { "model": "tvos", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "itunes", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "icloud", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "ios", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "safari", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "watchos", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": "7.0" }, { "model": "safari", "scope": null, "trust": 0.7, "vendor": "apple", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1390" }, { "db": "JVNDB", "id": "JVNDB-2020-014211" }, { "db": "NVD", "id": "CVE-2020-9947" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cc", "sources": [ { "db": "ZDI", "id": "ZDI-20-1390" } ], "trust": 0.7 }, "cve": "CVE-2020-9947", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2020-9947", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-188072", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-9947", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-9947", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-9947", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-9947", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2020-9947", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2020-9947", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202011-1412", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-188072", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-9947", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1390" }, { "db": "VULHUB", "id": "VHN-188072" }, { "db": "VULMON", "id": "CVE-2020-9947" }, { "db": "JVNDB", "id": "JVNDB-2020-014211" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202011-1412" }, { "db": "NVD", "id": "CVE-2020-9947" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 7.0, iOS 14.0 and iPadOS 14.0, iTunes for Windows 12.10.9, iCloud for Windows 11.5, tvOS 14.0, Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of RenderObject objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. WebKit for Apple is the American Apple ( Apple ) is an efficient and stable open source browser engine from the company. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2020-11-13-3 Additional information for\nAPPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0\n\niOS 14.0 and iPadOS 14.0 addresses the following issues. Information\nabout the security content is also available at\nhttps://support.apple.com/HT211850. \n\nAppleAVD\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: An application may be able to cause unexpected system\ntermination or write kernel memory\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2020-9958: Mohamed Ghannam (@_simo36)\n\nAssets\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: An attacker may be able to misuse a trust relationship to\ndownload malicious content\nDescription: A trust issue was addressed by removing a legacy API. \nCVE-2020-9979: CodeColorist of LightYear Security Lab of AntGroup\nEntry updated November 12, 2020\n\nAudio\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: A malicious application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2020-9943: JunDong Xie of Ant Group Light-Year Security Lab\nEntry added November 12, 2020\n\nAudio\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: An application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2020-9944: JunDong Xie of Ant Group Light-Year Security Lab\nEntry added November 12, 2020\n\nCoreAudio\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: Playing a malicious audio file may lead to arbitrary code\nexecution\nDescription: A buffer overflow issue was addressed with improved\nmemory handling. \nCVE-2020-9954: Francis working with Trend Micro Zero Day Initiative,\nJunDong Xie of Ant Group Light-Year Security Lab\nEntry added November 12, 2020\n\nCoreCapture\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2020-9949: Proteas\nEntry added November 12, 2020\n\nDisk Images\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2020-9965: Proteas\nCVE-2020-9966: Proteas\nEntry added November 12, 2020\n\nIcons\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: A malicious application may be able to identify what other\napplications a user has installed\nDescription: The issue was addressed with improved handling of icon\ncaches. \nCVE-2020-9773: Chilik Tamir of Zimperium zLabs\n\nIDE Device Support\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: An attacker in a privileged network position may be able to\nexecute arbitrary code on a paired device during a debug session over\nthe network\nDescription: This issue was addressed by encrypting communications\nover the network to devices running iOS 14, iPadOS 14, tvOS 14, and\nwatchOS 7. \nCVE-2020-9992: Dany Lisiansky (@DanyL931), Nikias Bassen of Zimperium\nzLabs\nEntry updated September 17, 2020\n\nImageIO\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2020-9961: Xingwei Lin of Ant Security Light-Year Lab\nEntry added November 12, 2020\n\nImageIO\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: Opening a maliciously crafted PDF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2020-9876: Mickey Jin of Trend Micro\nEntry added November 12, 2020\n\nIOSurfaceAccelerator\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: A local user may be able to read kernel memory\nDescription: A memory initialization issue was addressed with\nimproved memory handling. \nCVE-2020-9964: Mohamed Ghannam (@_simo36), Tommy Muir (@Muirey03)\n\nKernel\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: An attacker in a privileged network position may be able to\ninject into active connections within a VPN tunnel\nDescription: A routing issue was addressed with improved\nrestrictions. \nCVE-2019-14899: William J. Tolley, Beau Kujath, and Jedidiah R. \nCrandall\nEntry added November 12, 2020\n\nKeyboard\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: A malicious application may be able to leak sensitive user\ninformation\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2020-9976: Rias A. Sherzad of JAIDE GmbH in Hamburg, Germany\n\nlibxml2\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: Processing a maliciously crafted file may lead to arbitrary\ncode execution\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2020-9981: found by OSS-Fuzz\nEntry added November 12, 2020\n\nMail\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: A remote attacker may be able to unexpectedly alter\napplication state\nDescription: This issue was addressed with improved checks. \nCVE-2020-9941: Fabian Ising of FH M\u00fcnster University of Applied\nSciences and Damian Poddebniak of FH M\u00fcnster University of Applied\nSciences\nEntry added November 12, 2020\n\nMessages\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: A local user may be able to discover a user\u2019s deleted\nmessages\nDescription: The issue was addressed with improved deletion. \nCVE-2020-9988: William Breuer of the Netherlands\nCVE-2020-9989: von Brunn Media\nEntry added November 12, 2020\n\nModel I/O\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: Processing a maliciously crafted USD file may lead to\nunexpected application termination or arbitrary code execution\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2020-13520: Aleksandar Nikolic of Cisco Talos\nEntry added November 12, 2020\n\nModel I/O\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: Processing a maliciously crafted USD file may lead to\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow issue was addressed with improved\nmemory handling. \nCVE-2020-6147: Aleksandar Nikolic of Cisco Talos\nCVE-2020-9972: Aleksandar Nikolic of Cisco Talos\nEntry added November 12, 2020\n\nModel I/O\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: Processing a maliciously crafted USD file may lead to\nunexpected application termination or arbitrary code execution\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2020-9973: Aleksandar Nikolic of Cisco Talos\n\nNetworkExtension\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: A malicious application may be able to elevate privileges\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2020-9996: Zhiwei Yuan of Trend Micro iCore Team, Junzhi Lu and\nMickey Jin of Trend Micro\nEntry added November 12, 2020\n\nPhone\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: The screen lock may not engage after the specified time\nperiod\nDescription: This issue was addressed with improved checks. \nCVE-2020-9946: Daniel Larsson of iolight AB\n\nQuick Look\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: A malicious app may be able to determine the existence of\nfiles on the computer\nDescription: The issue was addressed with improved handling of icon\ncaches. \nCVE-2020-9963: Csaba Fitzl (@theevilbit) of Offensive Security\nEntry added November 12, 2020\n\nSafari\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: A malicious application may be able to determine a user\u0027s\nopen tabs in Safari\nDescription: A validation issue existed in the entitlement\nverification. \nCVE-2020-9977: Josh Parnham (@joshparnham)\nEntry added November 12, 2020\n\nSafari\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: Visiting a malicious website may lead to address bar spoofing\nDescription: The issue was addressed with improved UI handling. \nCVE-2020-9993: Masato Sugiyama (@smasato) of University of Tsukuba,\nPiotr Duszynski\nEntry added November 12, 2020\n\nSandbox\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: A local user may be able to view senstive user information\nDescription: An access issue was addressed with additional sandbox\nrestrictions. \nCVE-2020-9969: Wojciech Regu\u0142a of SecuRing (wojciechregula.blog)\nEntry added November 12, 2020\n\nSandbox\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: A malicious application may be able to access restricted\nfiles\nDescription: A logic issue was addressed with improved restrictions. \nCVE-2020-9968: Adam Chester (@_xpn_) of TrustedSec\nEntry updated September 17, 2020\n\nSiri\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: A person with physical access to an iOS device may be able to\nview notification contents from the lockscreen\nDescription: A lock screen issue allowed access to messages on a\nlocked device. \nCVE-2020-9959: an anonymous researcher, an anonymous researcher, an\nanonymous researcher, an anonymous researcher, an anonymous\nresearcher, Andrew Goldberg The University of Texas at Austin,\nMcCombs School of Business, Meli\u0307h Kerem G\u00fcne\u015f of Li\u0307v College, Sinan\nGulguler\n\nSQLite\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: A remote attacker may be able to cause a denial of service\nDescription: This issue was addressed with improved checks. \nCVE-2020-13434\nCVE-2020-13435\nCVE-2020-9991\nEntry added November 12, 2020\n\nSQLite\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: A remote attacker may be able to leak memory\nDescription: An information disclosure issue was addressed with\nimproved state management. \nCVE-2020-9849\nEntry added November 12, 2020\n\nSQLite\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: Multiple issues in SQLite\nDescription: Multiple issues were addressed by updating SQLite to\nversion 3.32.3. \nCVE-2020-15358\nEntry added November 12, 2020\n\nSQLite\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: A maliciously crafted SQL query may lead to data corruption\nDescription: This issue was addressed with improved checks. \nCVE-2020-13631\nEntry added November 12, 2020\n\nSQLite\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: A remote attacker may be able to cause arbitrary code\nexecution\nDescription: A memory corruption issue was addressed with improved\nstate management. \nCVE-2020-13630\nEntry added November 12, 2020\n\nWebKit\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2020-9947: cc working with Trend Micro Zero Day Initiative\nCVE-2020-9950: cc working with Trend Micro Zero Day Initiative\nCVE-2020-9951: Marcin \u0027Icewall\u0027 Noga of Cisco Talos\nEntry added November 12, 2020\n\nWebKit\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: Processing maliciously crafted web content may lead to code\nexecution\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2020-9983: zhunki\nEntry added November 12, 2020\n\nWebKit\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: Processing maliciously crafted web content may lead to a\ncross site scripting attack\nDescription: An input validation issue was addressed with improved\ninput validation. \nCVE-2020-9952: Ryan Pickren (ryanpickren.com)\n\nWi-Fi\nAvailable for: iPhone 6s and later, iPod touch 7th generation, iPad\nAir 2 and later, and iPad mini 4 and later\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2020-10013: Yu Wang of Didi Research America\nEntry added November 12, 2020\n\nAdditional recognition\n\nApp Store\nWe would like to acknowledge Giyas Umarov of Holmdel High School for\ntheir assistance. \n\nAudio\nWe would like to acknowledge JunDong Xie and XingWei Lin of Ant-\nfinancial Light-Year Security Lab for their assistance. \nEntry added November 12, 2020\n\nBluetooth\nWe would like to acknowledge Andy Davis of NCC Group and Dennis\nHeinze (@ttdennis) of TU Darmstadt, Secure Mobile Networking Lab for\ntheir assistance. \n\nCallKit\nWe would like to acknowledge Federico Zanetello for their assistance. \n\nCarPlay\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nClang\nWe would like to acknowledge Brandon Azad of Google Project Zero for\ntheir assistance. \nEntry added November 12, 2020\n\nCore Location\nWe would like to acknowledge Yi\u011fit Can YILMAZ (@yilmazcanyigit) for\ntheir assistance. \n\ndebugserver\nWe would like to acknowledge Linus Henze (pinauten.de) for their\nassistance. \n\niAP\nWe would like to acknowledge Andy Davis of NCC Group for their\nassistance. \n\niBoot\nWe would like to acknowledge Brandon Azad of Google Project Zero for\ntheir assistance. \n\nKernel\nWe would like to acknowledge Brandon Azad of Google Project Zero,\nStephen R\u00f6ttger of Google for their assistance. \nEntry updated November 12, 2020\n\nlibarchive\nWe would like to acknowledge Dzmitry Plotnikau and an anonymous\nresearcher for their assistance. \n\nlldb\nWe would like to acknowledge Linus Henze (pinauten.de) for their\nassistance. \nEntry added November 12, 2020\n\nLocation Framework\nWe would like to acknowledge Nicolas Brunner\n(linkedin.com/in/nicolas-brunner-651bb4128) for their assistance. \nEntry updated October 19, 2020\n\nMail\nWe would like to acknowledge an anonymous researcher for their\nassistance. \nEntry added November 12, 2020\n\nMail Drafts\nWe would like to acknowledge Jon Bottarini of HackerOne for their\nassistance. \nEntry added November 12, 2020\n\nMaps\nWe would like to acknowledge Matthew Dolan of Amazon Alexa for their\nassistance. \n\nNetworkExtension\nWe would like to acknowledge Thijs Alkemade of Computest and \u2018Qubo\nSong\u2019 of \u2018Symantec, a division of Broadcom\u2019 for their assistance. \n\nPhone Keypad\nWe would like to acknowledge Hasan Fahrettin Kaya of Akdeniz\nUniversity, an anonymous researcher for their assistance. \nEntry updated November 12, 2020 \n\nSafari\nWe would like to acknowledge Andreas Gutmann (@KryptoAndI) of\nOneSpan\u0027s Innovation Centre (onespan.com) and University College\nLondon, Steven J. Murdoch (@SJMurdoch) of OneSpan\u0027s Innovation Centre\n(onespan.com) and University College London, Jack Cable of Lightning\nSecurity, Ryan Pickren (ryanpickren.com), Yair Amit for their\nassistance. \nEntry added November 12, 2020\n\nSafari Reader\nWe would like to acknowledge Zhiyang Zeng(@Wester) of OPPO ZIWU\nSecurity Lab for their assistance. \nEntry added November 12, 2020\n\nSecurity\nWe would like to acknowledge Christian Starkjohann of Objective\nDevelopment Software GmbH for their assistance. \nEntry added November 12, 2020\n\nStatus Bar\nWe would like to acknowledge Abdul M. Majumder, Abdullah Fasihallah\nof Taif university, Adwait Vikas Bhide, Frederik Schmid, Nikita, and\nan anonymous researcher for their assistance. \n\nTelephony\nWe would like to acknowledge Onur Can B\u0131kmaz, Vodafone Turkey\n@canbkmaz, Yi\u011fit Can YILMAZ (@yilmazcanyigit), an anonymous\nresearcher for their assistance. \nEntry updated November 12, 2020\n\nUIKit\nWe would like to acknowledge Borja Marcos of Sarenet, Simon de Vegt,\nand Talal Haj Bakry (@hajbakri) and Tommy Mysk (@tommymysk) of Mysk\nInc for their assistance. \n\nWeb App\nWe would like to acknowledge Augusto Alvarez of Outcourse Limited for\ntheir assistance. \n\nWebKit\nWe would like to acknowledge Pawel Wylecial of REDTEAM.PL, Ryan\nPickren (ryanpickren.com), Tsubasa FUJII (@reinforchu), Zhiyang\nZeng(@Wester) of OPPO ZIWU Security Lab for their assistance. \nEntry added November 12, 2020\n\nInstallation note:\n\nThis update is available through iTunes and Software Update on your\niOS device, and will not appear in your computer\u0027s Software Update\napplication, or in the Apple Downloads site. Make sure you have an\nInternet connection and have installed the latest version of iTunes\nfrom https://www.apple.com/itunes/\n\niTunes and Software Update on the device will automatically check\nApple\u0027s update server on its weekly schedule. When an update is\ndetected, it is downloaded and the option to be installed is\npresented to the user when the iOS device is docked. We recommend\napplying the update immediately if possible. Selecting Don\u0027t Install\nwill present the option the next time you connect your iOS device. \n\nThe automatic update process may take up to a week depending on the\nday that iTunes or the device checks for updates. You may manually\nobtain the update via the Check for Updates button within iTunes, or\nthe Software Update on your device. \n\nTo check that the iPhone, iPod touch, or iPad has been updated:\n\n* Navigate to Settings\n* Select General\n* Select About. The version after applying this update\nwill be \"iOS 14.0 and iPadOS 14.0\". \n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\nuARpQRQsureymLerXpVTwH8ZoeDEeZZwaqNHTQKg/M9ifAZPZUA=\n=WdqR\n-----END PGP SIGNATURE-----\n\n\n\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202104-03\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: WebkitGTK+: Multiple vulnerabilities\n Date: April 30, 2021\n Bugs: #770793, #773193\n ID: 202104-03\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in WebkitGTK+, the worst of\nwhich could result in the arbitrary execution of code. \n\nBackground\n==========\n\nWebKitGTK+ is a full-featured port of the WebKit rendering engine,\nsuitable for projects requiring any kind of web integration, from\nhybrid HTML/CSS applications to full-fledged web browsers. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-libs/webkit-gtk \u003c 2.30.6 \u003e= 2.30.6\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in WebkitGTK+. Please\nreview the CVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll WebkitGTK+ users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-libs/webkit-gtk-2.30.6\"\n\nReferences\n==========\n\n[ 1 ] CVE-2020-13558\n https://nvd.nist.gov/vuln/detail/CVE-2020-13558\n[ 2 ] CVE-2020-27918\n https://nvd.nist.gov/vuln/detail/CVE-2020-27918\n[ 3 ] CVE-2020-29623\n https://nvd.nist.gov/vuln/detail/CVE-2020-29623\n[ 4 ] CVE-2020-9947\n https://nvd.nist.gov/vuln/detail/CVE-2020-9947\n[ 5 ] CVE-2021-1765\n https://nvd.nist.gov/vuln/detail/CVE-2021-1765\n[ 6 ] CVE-2021-1789\n https://nvd.nist.gov/vuln/detail/CVE-2021-1789\n[ 7 ] CVE-2021-1799\n https://nvd.nist.gov/vuln/detail/CVE-2021-1799\n[ 8 ] CVE-2021-1801\n https://nvd.nist.gov/vuln/detail/CVE-2021-1801\n[ 9 ] CVE-2021-1870\n https://nvd.nist.gov/vuln/detail/CVE-2021-1870\n[ 10 ] WSA-2021-0001\n https://webkitgtk.org/security/WSA-2021-0001.html\n[ 11 ] WSA-2021-0002\n https://webkitgtk.org/security/WSA-2021-0002.html\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202104-03\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2021 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. \n\nAlternatively, on your watch, select \"My Watch \u003e General \u003e About\"", "sources": [ { "db": "NVD", "id": "CVE-2020-9947" }, { "db": "JVNDB", "id": "JVNDB-2020-014211" }, { "db": "ZDI", "id": "ZDI-20-1390" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "VULHUB", "id": "VHN-188072" }, { "db": "VULMON", "id": "CVE-2020-9947" }, { "db": "PACKETSTORM", "id": "160061" }, { "db": "PACKETSTORM", "id": "162412" }, { "db": "PACKETSTORM", "id": "160063" }, { "db": "PACKETSTORM", "id": "160062" }, { "db": "PACKETSTORM", "id": "160064" } ], "trust": 3.42 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9947", "trust": 3.8 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2021/03/22/1", "trust": 1.8 }, { "db": "PACKETSTORM", "id": "162412", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "160061", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU92370378", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU92546061", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-014211", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11125", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-1390", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0382", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2194", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3181.2", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021050106", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202011-1412", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "160064", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "160063", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "160062", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-188072", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-9947", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1390" }, { "db": "VULHUB", "id": "VHN-188072" }, { "db": "VULMON", "id": "CVE-2020-9947" }, { "db": "JVNDB", "id": "JVNDB-2020-014211" }, { "db": "PACKETSTORM", "id": "160061" }, { "db": "PACKETSTORM", "id": "162412" }, { "db": "PACKETSTORM", "id": "160063" }, { "db": "PACKETSTORM", "id": "160062" }, { "db": "PACKETSTORM", "id": "160064" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202011-1412" }, { "db": "NVD", "id": "CVE-2020-9947" } ] }, "id": "VAR-202012-1515", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-188072" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:47:54.270000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT211935 Apple\u00a0 Security update", "trust": 0.8, "url": "https://support.apple.com/en-us/HT211843" }, { "title": "Apple has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://support.apple.com/en-us/HT211845" }, { "title": "Red Hat: CVE-2020-9947", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2020-9947" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2020-9947 log" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1390" }, { "db": "VULMON", "id": "CVE-2020-9947" }, { "db": "JVNDB", "id": "JVNDB-2020-014211" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-188072" }, { "db": "JVNDB", "id": "JVNDB-2020-014211" }, { "db": "NVD", "id": "CVE-2020-9947" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://support.apple.com/en-us/ht211845" }, { "trust": 2.4, "url": "https://support.apple.com/en-us/ht211935" }, { "trust": 1.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9947" }, { "trust": 1.8, "url": "https://security.gentoo.org/glsa/202104-03" }, { "trust": 1.8, "url": "https://support.apple.com/en-us/ht211843" }, { "trust": 1.8, "url": "https://support.apple.com/en-us/ht211844" }, { "trust": 1.8, "url": "https://support.apple.com/en-us/ht211850" }, { "trust": 1.8, "url": "https://support.apple.com/en-us/ht211952" }, { "trust": 1.8, "url": "http://www.openwall.com/lists/oss-security/2021/03/22/1" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92546061/" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92370378/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/160061/apple-security-advisory-2020-11-13-3.html" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/webkitgtk-multiple-vulnerabilities-34951" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021050106" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0382" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3181.2/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2194" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/162412/gentoo-linux-security-advisory-202104-03.html" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9951" }, { "trust": 0.4, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9950" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9952" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9961" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13434" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13435" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9944" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9954" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13631" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9943" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9965" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-15358" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9876" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13630" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9949" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9849" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9983" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9941" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9946" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10013" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9993" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9981" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9991" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9976" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9968" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9966" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9969" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9947" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/191759" }, { "trust": 0.1, "url": "https://www.apple.com/itunes/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9964" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-6147" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9963" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9773" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9958" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14899" }, { "trust": 0.1, "url": "https://support.apple.com/ht211850." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13520" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9959" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1789" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1870" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27918" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1799" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13558" }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29623" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1801" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://webkitgtk.org/security/wsa-2021-0002.html" }, { "trust": 0.1, "url": "https://webkitgtk.org/security/wsa-2021-0001.html" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1765" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9948" }, { "trust": 0.1, "url": "https://support.apple.com/ht211845." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9987" }, { "trust": 0.1, "url": "https://support.apple.com/ht211843." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9979" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht204641" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9989" }, { "trust": 0.1, "url": "https://support.apple.com/ht211844." } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-1390" }, { "db": "VULHUB", "id": "VHN-188072" }, { "db": "VULMON", "id": "CVE-2020-9947" }, { "db": "JVNDB", "id": "JVNDB-2020-014211" }, { "db": "PACKETSTORM", "id": "160061" }, { "db": "PACKETSTORM", "id": "162412" }, { "db": "PACKETSTORM", "id": "160063" }, { "db": "PACKETSTORM", "id": "160062" }, { "db": "PACKETSTORM", "id": "160064" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202011-1412" }, { "db": "NVD", "id": "CVE-2020-9947" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-20-1390" }, { "db": "VULHUB", "id": "VHN-188072" }, { "db": "VULMON", "id": "CVE-2020-9947" }, { "db": "JVNDB", "id": "JVNDB-2020-014211" }, { "db": "PACKETSTORM", "id": "160061" }, { "db": "PACKETSTORM", "id": "162412" }, { "db": "PACKETSTORM", "id": "160063" }, { "db": "PACKETSTORM", "id": "160062" }, { "db": "PACKETSTORM", "id": "160064" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202011-1412" }, { "db": "NVD", "id": "CVE-2020-9947" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-12-03T00:00:00", "db": "ZDI", "id": "ZDI-20-1390" }, { "date": "2020-12-08T00:00:00", "db": "VULHUB", "id": "VHN-188072" }, { "date": "2020-12-08T00:00:00", "db": "VULMON", "id": "CVE-2020-9947" }, { "date": "2021-08-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-014211" }, { "date": "2020-11-13T20:32:22", "db": "PACKETSTORM", "id": "160061" }, { "date": "2021-05-03T20:24:45", "db": "PACKETSTORM", "id": "162412" }, { "date": "2020-11-13T23:33:33", "db": "PACKETSTORM", "id": "160063" }, { "date": "2020-11-13T22:22:22", "db": "PACKETSTORM", "id": "160062" }, { "date": "2020-11-14T12:44:44", "db": "PACKETSTORM", "id": "160064" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2020-11-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202011-1412" }, { "date": "2020-12-08T20:15:16.713000", "db": "NVD", "id": "CVE-2020-9947" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-12-03T00:00:00", "db": "ZDI", "id": "ZDI-20-1390" }, { "date": "2022-06-02T00:00:00", "db": "VULHUB", "id": "VHN-188072" }, { "date": "2021-03-23T00:00:00", "db": "VULMON", "id": "CVE-2020-9947" }, { "date": "2021-08-11T03:01:00", "db": "JVNDB", "id": "JVNDB-2020-014211" }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2022-01-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202011-1412" }, { "date": "2024-11-21T05:41:34.753000", "db": "NVD", "id": "CVE-2020-9947" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202011-1412" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Apple\u00a0 Product Free Memory Usage Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014211" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 } }
fkie_cve-2020-9947
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "matchCriteriaId": "83F73A4A-BF43-4F89-812D-FBDD33CDEF44", "versionEndExcluding": "11.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "matchCriteriaId": "599D94C6-FD19-4848-8037-D298B331DE16", "versionEndExcluding": "12.10.9", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DE1F811-8D4C-4C36-82DB-FE761C07FD0B", "versionEndExcluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "matchCriteriaId": "10CC9ED4-9AE1-415A-94FF-60CB209506CA", "versionEndExcluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "16AF4D2F-3C55-4DCC-A253-3F8CB4F453EF", "versionEndExcluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D16EC4D-D2E7-476D-BFBC-3703C8F0B45E", "versionEndExcluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "matchCriteriaId": "C117BCCF-7789-40BB-AD25-1E712F6DCF7C", "versionEndExcluding": "7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 7.0, iOS 14.0 and iPadOS 14.0, iTunes for Windows 12.10.9, iCloud for Windows 11.5, tvOS 14.0, Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution." }, { "lang": "es", "value": "Se abord\u00f3 un problema de uso de la memoria previamente liberada con una administraci\u00f3n de la memoria mejorada. Este problema se corrigi\u00f3 en watchOS versi\u00f3n 7.0, iOS versi\u00f3n 14.0 e iPadOS versi\u00f3n 14.0, iTunes para Windows versi\u00f3n 12.10.9, iCloud para Windows versi\u00f3n 11.5, tvOS versi\u00f3n 14.0, Safari versi\u00f3n 14.0. Un procesamiento de contenido web malicioso puede conllevar a una ejecuci\u00f3n de c\u00f3digo arbitraria" } ], "id": "CVE-2020-9947", "lastModified": "2024-11-21T05:41:34.753", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-08T20:15:16.713", "references": [ { "source": "product-security@apple.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/03/22/1" }, { "source": "product-security@apple.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202104-03" }, { "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT211843" }, { "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT211844" }, { "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT211845" }, { "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT211850" }, { "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT211935" }, { "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT211952" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/03/22/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202104-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT211843" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT211844" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT211845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT211850" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT211935" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT211952" } ], "sourceIdentifier": "product-security@apple.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
rhsa-2025:10364
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkitgtk4 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK+ is port of the WebKit portable web rendering engine to the GTK+ platform. These packages provide WebKitGTK+ for GTK+ 3.\n\nSecurity Fix(es):\n\n* webkitgtk: Command injection in web inspector (CVE-2020-9862)\n\n* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9893)\n\n* webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution (CVE-2020-9894)\n\n* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9895)\n\n* webkitgtk: Access issue in content security policy (CVE-2020-9915)\n\n* webkitgtk: A logic issue may lead to cross site scripting (CVE-2020-9925)\n\n* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9802)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9803)\n\n* webkitgtk: Logic issue may lead to cross site scripting (CVE-2020-9805)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9806)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9807)\n\n* webkitgtk: Input validation issue may lead to cross site scripting (CVE-2020-9843)\n\n* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9850)\n\n* webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl (CVE-2020-13753)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)\n\n* webkitgtk: input validation issue may lead to a cross site scripting (CVE-2020-9952)\n\n* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)\n\n* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)\n\n* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)\n\n* webkitgtk: use after free issue may lead to arbitrary code execution (CVE-2020-9947)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)\n\n* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)\n\n* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-1817)\n\n* webkitgtk: Memory initialization issue possibly leading to memory disclosure (CVE-2021-1820)\n\n* webkitgtk: Input validation issue leading to cross site scripting attack (CVE-2021-1825)\n\n* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-1826)\n\n* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)\n\n* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30661)\n\n* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30666)\n\n* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)\n\n* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)\n\n* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)\n\n* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)\n\n* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30761)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30762)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)\n\n* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)\n\n* webkitgtk: limited sandbox escape via VFS syscalls (CVE-2021-42762)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)\n\n* webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)\n\n* webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)\n\n* webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)\n\n* webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)\n\n* webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)\n\n* webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)\n\n* webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)\n\n* chromium-browser: Inappropriate implementation in Navigation (CVE-2022-0108)\n\n* webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)\n\n* webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)\n\n* webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)\n\n* webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)\n\n* webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)\n\n* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)\n\n* webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)\n\n* webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer (CVE-2022-30294)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted (CVE-2022-22677)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)\n\n* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)\n\n* webkitgtk: out-of-bounds read was addressed with improved bounds checking (CVE-2022-32912)\n\n* webkitgtk: UI spoofing while Visiting a website that frames malicious content (CVE-2022-32891)\n\n* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)\n\n* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)\n\n* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)\n\n* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)\n\n* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)\n\n* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)\n\n* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)\n\n* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)\n\n* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)\n\n* WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205)\n\n* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)\n\n* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)\n\n* webkitgtk: improper bounds checking leading to arbitrary code execution (CVE-2022-48503)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)\n\n* webkitgtk: arbitrary code execution (CVE-2023-37450)\n\n* webkitgtk: arbitrary code execution (CVE-2023-32393)\n\n* webkitgtk: disclose sensitive information (CVE-2023-38133)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-38592)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38594)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38595)\n\n* webkitgtk: track sensitive user information (CVE-2023-38599)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38600)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38611)\n\n* webkitgtk: bypass Same Origin Policy (CVE-2023-38572)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38597)\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: Same Origin Policy bypass via crafted web content (CVE-2023-27932)\n\n* webkitgtk: Website may be able to track sensitive user information (CVE-2023-27954)\n\n* webkitgtk: use after free vulnerability (CVE-2023-28198)\n\n* webkitgtk: content security policy blacklist failure (CVE-2023-32370)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32792)\n\n* webkitgtk: malicious content may lead to UI spoofing (CVE-2022-32816)\n\n* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-41993)\n\n* webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (CVE-2023-39928)\n\n* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-35074)\n\n* webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code (CVE-2023-40451)\n\n* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-41074)\n\n* webkitgtk: Out-of-bounds read leads to sensitive data leak (CVE-2023-42916)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: processing a malicious image may lead to a denial of service (CVE-2023-42883)\n\n* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-42890)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-23213)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-40414)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42833)\n\n* webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents (CVE-2014-1745)\n\n* webkit: processing malicious web content may lead to denial-of-service (CVE-2024-23252)\n\n* webkit: malicious website may exfiltrate audio data cross-origin (CVE-2024-23254)\n\n* webkit: processing malicious web content prevents Content Security Policy from being enforced (CVE-2024-23263)\n\n* webkit: maliciously crafted webpage may be able to fingerprint the user (CVE-2024-23280)\n\n* webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced (CVE-2024-23284)\n\n* webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing. (CVE-2022-32919)\n\n* webkitgtk: A website may able to track visited websites in private browsing (CVE-2022-32933)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2022-46705)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing. (CVE-2022-46725)\n\n* webkitgtk: User password may be read aloud by a text-to-speech accessibility feature (CVE-2023-32359)\n\n* webkitgtk: Processing web content may lead to a denial of service (CVE-2023-41983)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* webkit: visiting a malicious website may lead to address bar spoofing (CVE-2023-42843)\n\n* webkit: heap use-after-free may lead to arbitrary code execution (CVE-2023-42950)\n\n* webkit: processing malicious web content may lead to a denial of service (CVE-2023-42956)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkit: pointer authentication bypass (CVE-2024-27834)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)\n\n* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)\n\n* webkitgtk: data isolation bypass vulnerability (CVE-2024-44309)\n\n* webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-44308)\n\n* WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54479)\n\n* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54502)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54505)\n\n* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54508)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54534)\n\n* webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution (CVE-2024-27856)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54543)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2025-24143)\n\n* webkitgtk: Copying a URL from Web Inspector may lead to command injection (CVE-2025-24150)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2025-24158)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24162)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54658)\n\n* webkitgtk: out-of-bounds write vulnerability (CVE-2025-24201)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551)\n\n* webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209)\n\n* webkitgtk: A type confusion issue could lead to memory corruption (CVE-2025-24213)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24264)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42875)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42970)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-24223)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-31204)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2025-31205)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31206)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-31215)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31257)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:10364", "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1879532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879532" }, { "category": "external", "summary": "1879535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879535" }, { "category": "external", "summary": "1879536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879536" }, { "category": "external", "summary": "1879538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879538" }, { "category": "external", "summary": "1879540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879540" }, { "category": "external", "summary": "1879541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879541" }, { "category": "external", "summary": "1879545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879545" }, { "category": "external", "summary": "1879557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879557" }, { "category": "external", "summary": "1879559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879559" }, { "category": "external", "summary": "1879563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879563" }, { "category": "external", "summary": "1879564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879564" }, { "category": "external", "summary": "1879566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879566" }, { "category": "external", "summary": "1879568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879568" }, { "category": "external", "summary": "1879570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879570" }, { "category": "external", "summary": "1901212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901212" }, { "category": "external", "summary": "1901214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901214" }, { "category": "external", "summary": "1901216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901216" }, { "category": "external", "summary": "1901219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901219" }, { "category": "external", "summary": "1901221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901221" }, { "category": "external", "summary": "1903568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903568" }, { "category": "external", "summary": "1928886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886" }, { "category": "external", "summary": "1944323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323" }, { "category": "external", "summary": "1944329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329" }, { "category": "external", "summary": "1944331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944331" }, { "category": "external", "summary": "1944333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333" }, { "category": "external", "summary": "1944337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337" }, { "category": "external", "summary": "1944340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944340" }, { "category": "external", "summary": "1944343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944343" }, { "category": "external", "summary": "1944350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944350" }, { "category": "external", "summary": "1944859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859" }, { "category": "external", "summary": "1944862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944862" }, { "category": "external", "summary": "1944867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944867" }, { "category": "external", "summary": "1980441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980441" }, { "category": "external", "summary": "1986852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986852" }, { "category": "external", "summary": "1986856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986856" }, { "category": "external", "summary": "1986858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986858" }, { "category": "external", "summary": "1986860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986860" }, { "category": "external", "summary": "1986863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986863" }, { "category": "external", "summary": "1986866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986866" }, { "category": "external", "summary": "1986870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986870" }, { "category": "external", "summary": "1986872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986872" }, { "category": "external", "summary": "1986874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986874" }, { "category": "external", "summary": "1986877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986877" }, { "category": "external", "summary": "1986879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986879" }, { "category": "external", "summary": "1986881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986881" }, { "category": "external", "summary": "1986883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986883" }, { "category": "external", "summary": "1986886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986886" }, { "category": "external", "summary": "1986888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986888" }, { "category": "external", "summary": "1986890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986890" }, { "category": "external", "summary": "1986892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986892" }, { "category": "external", "summary": "1986894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986894" }, { "category": "external", "summary": "1986898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986898" }, { "category": "external", "summary": "1986900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986900" }, { "category": "external", "summary": "1986902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986902" }, { "category": "external", "summary": "1986906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986906" }, { "category": "external", "summary": "2016673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016673" }, { "category": "external", "summary": "2017898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898" }, { "category": "external", "summary": "2017901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901" }, { "category": "external", "summary": "2017904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904" }, { "category": "external", "summary": "2018573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573" }, { "category": "external", "summary": "2034347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347" }, { "category": "external", "summary": "2034368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368" }, { "category": "external", "summary": "2034373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373" }, { "category": "external", "summary": "2034376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376" }, { "category": "external", "summary": "2034378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378" }, { "category": "external", "summary": "2034381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381" }, { "category": "external", "summary": "2034383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383" }, { "category": "external", "summary": "2034386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386" }, { "category": "external", "summary": "2034389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389" }, { "category": "external", "summary": "2037469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037469" }, { "category": "external", "summary": "2038907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907" }, { "category": "external", "summary": "2040327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327" }, { "category": "external", "summary": "2040329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329" }, { "category": "external", "summary": "2040331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331" }, { "category": "external", "summary": "2044521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521" }, { "category": "external", "summary": "2044528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528" }, { "category": "external", "summary": "2044534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534" }, { "category": "external", "summary": "2044538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538" }, { "category": "external", "summary": "2044542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542" }, { "category": "external", "summary": "2044551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551" }, { "category": "external", "summary": "2044553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553" }, { "category": "external", "summary": "2045291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291" }, { "category": "external", "summary": "2053179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179" }, { "category": "external", "summary": "2053181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181" }, { "category": "external", "summary": "2053185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185" }, { "category": "external", "summary": "2056474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474" }, { "category": "external", "summary": "2073893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893" }, { "category": "external", "summary": "2073896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896" }, { "category": "external", "summary": "2073899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899" }, { "category": "external", "summary": "2073903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903" }, { "category": "external", "summary": "2082544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082544" }, { "category": "external", "summary": "2082548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548" }, { "category": "external", "summary": "2092732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732" }, { "category": "external", "summary": "2092733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733" }, { "category": "external", "summary": "2092734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734" }, { "category": "external", "summary": "2092735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735" }, { "category": "external", "summary": "2092736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736" }, { "category": "external", "summary": "2104787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787" }, { "category": "external", "summary": "2104788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104788" }, { "category": "external", "summary": "2104789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789" }, { "category": "external", "summary": "2121645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121645" }, { "category": "external", "summary": "2128643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643" }, { "category": "external", "summary": "2128645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128645" }, { "category": "external", "summary": "2128647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647" }, { "category": "external", "summary": "2140501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501" }, { "category": "external", "summary": "2140502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502" }, { "category": "external", "summary": "2140503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503" }, { "category": "external", "summary": "2140504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504" }, { "category": "external", "summary": "2140505", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505" }, { "category": "external", "summary": "2153683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153683" }, { "category": "external", "summary": "2156986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986" }, { "category": "external", "summary": "2156987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987" }, { "category": "external", "summary": "2156989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989" }, { "category": "external", "summary": "2156990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990" }, { "category": "external", "summary": "2156991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991" }, { "category": "external", "summary": "2156992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992" }, { "category": "external", "summary": "2156993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993" }, { "category": "external", "summary": "2156994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994" }, { "category": "external", "summary": "2167715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715" }, { "category": "external", "summary": "2167716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716" }, { "category": "external", "summary": "2167717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717" }, { "category": "external", "summary": "2169934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169934" }, { "category": "external", "summary": "2175099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099" }, { "category": "external", "summary": "2185724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185724" }, { "category": "external", "summary": "2209208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208" }, { "category": "external", "summary": "2209214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214" }, { "category": "external", "summary": "2218623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623" }, { "category": "external", "summary": "2218626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626" }, { "category": "external", "summary": "2218640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640" }, { "category": "external", "summary": "2223000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000" }, { "category": "external", "summary": "2224608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224608" }, { "category": "external", "summary": "2231015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231015" }, { "category": "external", "summary": "2231017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231017" }, { "category": "external", "summary": "2231018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018" }, { "category": "external", "summary": "2231019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019" }, { "category": "external", "summary": "2231020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231020" }, { "category": "external", "summary": "2231021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231021" }, { "category": "external", "summary": "2231022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231022" }, { "category": "external", "summary": "2231028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231028" }, { "category": "external", "summary": "2231043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231043" }, { "category": "external", "summary": "2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "2236843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236843" }, { "category": "external", "summary": "2236844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236844" }, { "category": "external", "summary": "2238943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943" }, { "category": "external", "summary": "2238944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238944" }, { "category": "external", "summary": "2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "2238973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973" }, { "category": "external", "summary": "2238975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975" }, { "category": "external", "summary": "2240522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522" }, { "category": "external", "summary": "2241400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241400" }, { "category": "external", "summary": "2241403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403" }, { "category": "external", "summary": "2241409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241409" }, { "category": "external", "summary": "2241412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412" }, { "category": "external", "summary": "2253054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054" }, { "category": "external", "summary": "2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "2254326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254326" }, { "category": "external", "summary": "2254327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254327" }, { "category": "external", "summary": "2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "2270141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270141" }, { "category": "external", "summary": "2270143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270143" }, { "category": "external", "summary": "2270146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270146" }, { "category": "external", "summary": "2270151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270151" }, { "category": "external", "summary": "2270288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288" }, { "category": "external", "summary": "2270289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289" }, { "category": "external", "summary": "2270290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290" }, { "category": "external", "summary": "2270291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291" }, { "category": "external", "summary": "2270292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292" }, { "category": "external", "summary": "2271437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271437" }, { "category": "external", "summary": "2271441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271441" }, { "category": "external", "summary": "2271444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271444" }, { "category": "external", "summary": "2271446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271446" }, { "category": "external", "summary": "2271449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271449" }, { "category": "external", "summary": "2271453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271453" }, { "category": "external", "summary": "2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "2271717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271717" }, { "category": "external", "summary": "2271718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271718" }, { "category": "external", "summary": "2271719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271719" }, { "category": "external", "summary": "2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "2282412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412" }, { "category": "external", "summary": "2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "2312724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724" }, { "category": "external", "summary": "2314696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696" }, { "category": "external", "summary": "2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "2314702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702" }, { "category": "external", "summary": "2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "2314706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706" }, { "category": "external", "summary": "2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "external", "summary": "2323289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289" }, { "category": "external", "summary": "2327927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327927" }, { "category": "external", "summary": "2327931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327931" }, { "category": "external", "summary": "2333841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841" }, { "category": "external", "summary": "2333843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843" }, { "category": "external", "summary": "2333844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844" }, { "category": "external", "summary": "2333845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845" }, { "category": "external", "summary": "2333846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846" }, { "category": "external", "summary": "2344618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618" }, { "category": "external", "summary": "2344619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619" }, { "category": "external", "summary": "2344621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621" }, { "category": "external", "summary": "2344622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622" }, { "category": "external", "summary": "2344623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623" }, { "category": "external", "summary": "2344624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624" }, { "category": "external", "summary": "2344946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344946" }, { "category": "external", "summary": "2351802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351802" }, { "category": "external", "summary": "2353871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353871" }, { "category": "external", "summary": "2353872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353872" }, { "category": "external", "summary": "2357909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357909" }, { "category": "external", "summary": "2357910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357910" }, { "category": "external", "summary": "2357911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357911" }, { "category": "external", "summary": "2357913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357913" }, { "category": "external", "summary": "2357917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357917" }, { "category": "external", "summary": "2357918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918" }, { "category": "external", "summary": "2357919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357919" }, { "category": "external", "summary": "2366497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497" }, { "category": "external", "summary": "2366498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498" }, { "category": "external", "summary": "2366499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499" }, { "category": "external", "summary": "2366500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500" }, { "category": "external", "summary": "2366501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366501" }, { "category": "external", "summary": "2366502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502" }, { "category": "external", "summary": "2366503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503" }, { "category": "external", "summary": "2366504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366504" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10364.json" } ], "title": "Red Hat Security Advisory: webkitgtk4 security update", "tracking": { "current_release_date": "2025-07-16T14:44:43+00:00", "generator": { "date": "2025-07-16T14:44:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.3" } }, "id": "RHSA-2025:10364", "initial_release_date": "2025-07-07T02:28:52+00:00", "revision_history": [ { "date": "2025-07-07T02:28:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-07-07T02:28:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-16T14:44:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.48.3-2.el7_9.src", "product": { "name": "webkitgtk4-0:2.48.3-2.el7_9.src", "product_id": "webkitgtk4-0:2.48.3-2.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-devel@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.48.3-2.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-devel@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.48.3-2.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "product": { "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "product_id": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-doc@2.48.3-2.el7_9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.src", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch" }, "product_reference": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.src", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch" }, "product_reference": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-1745", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270151" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the SVG implementation within WebKitGTK. This flaw allows remote attackers to exploit the removal of an SVGFontFaceElement object, which occurs through specific vectors that trigger the deletion of the object during rendering.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1745" }, { "category": "external", "summary": "RHBZ#2270151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270151" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1745", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1745" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1745", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1745" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents" }, { "cve": "CVE-2020-9802", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879545" } ], "notes": [ { "category": "description", "text": "A logic issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows an attacker to process maliciously crafted web content that may lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9802" }, { "category": "external", "summary": "RHBZ#1879545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879545" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9802", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9802" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue may lead to arbitrary code execution" }, { "cve": "CVE-2020-9803", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879557" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. A memory corruption issue could allow processing maliciously crafted web content leading to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9803" }, { "category": "external", "summary": "RHBZ#1879557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879557" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9803", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9803" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption may lead to arbitrary code execution" }, { "cve": "CVE-2020-9805", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879559" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue may lead to cross site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9805" }, { "category": "external", "summary": "RHBZ#1879559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9805", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9805" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue may lead to cross site scripting" }, { "cve": "CVE-2020-9806", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879563" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkit gtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. A memory corruption issue could allow processing of maliciously crafted web content that could lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9806" }, { "category": "external", "summary": "RHBZ#1879563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879563" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9806", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9806" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption may lead to arbitrary code execution" }, { "cve": "CVE-2020-9807", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879564" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows an attacker to process maliciously crafted web content that may lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9807" }, { "category": "external", "summary": "RHBZ#1879564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9807", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9807" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption may lead to arbitrary code execution" }, { "cve": "CVE-2020-9843", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879566" } ], "notes": [ { "category": "description", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Input validation issue may lead to cross site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9843" }, { "category": "external", "summary": "RHBZ#1879566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879566" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9843", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9843" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Input validation issue may lead to cross site scripting" }, { "cve": "CVE-2020-9850", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879568" } ], "notes": [ { "category": "description", "text": "A logic issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows a remote attacker to cause arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t shipped any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9850" }, { "category": "external", "summary": "RHBZ#1879568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879568" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9850", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9850" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue may lead to arbitrary code execution" }, { "cve": "CVE-2020-9862", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879532" } ], "notes": [ { "category": "description", "text": "A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Command injection in web inspector", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9862" }, { "category": "external", "summary": "RHBZ#1879532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879532" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9862", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9862" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9862", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9862" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Command injection in web inspector" }, { "cve": "CVE-2020-9893", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879535" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in webkitgtk that affected WebKitGTK versions before 2.28.4 and WPE WebKit versions before 2.28.4. This flaw allows a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9893" }, { "category": "external", "summary": "RHBZ#1879535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879535" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9893", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9893" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9893", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9893" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution" }, { "cve": "CVE-2020-9894", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879536" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in webkitgtk that affected WebKitGTK versions before 2.28.4 and WPE WebKit versions before 2.28.4. This flaw allows a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9894" }, { "category": "external", "summary": "RHBZ#1879536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879536" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9894", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9894" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9894", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9894" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution" }, { "cve": "CVE-2020-9895", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879538" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk in versions prior to 2.28.4 and in WPE WebKit in versions prior to 2.28.4. A use-after-free issue was found allowing a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9895" }, { "category": "external", "summary": "RHBZ#1879538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879538" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9895", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9895" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9895", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9895" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution" }, { "cve": "CVE-2020-9915", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879540" } ], "notes": [ { "category": "description", "text": "An access issue existed in Content Security Policy. This issue was addressed with improved access restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Access issue in content security policy", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9915" }, { "category": "external", "summary": "RHBZ#1879540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9915", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9915" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9915", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9915" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Access issue in content security policy" }, { "cve": "CVE-2020-9925", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879541" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A logic issue may lead to cross site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9925" }, { "category": "external", "summary": "RHBZ#1879541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9925", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9925" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9925", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9925" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A logic issue may lead to cross site scripting" }, { "cve": "CVE-2020-9947", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944331" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use after free issue may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9947" }, { "category": "external", "summary": "RHBZ#1944331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944331" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9947", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9947" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9947", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9947" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use after free issue may lead to arbitrary code execution" }, { "cve": "CVE-2020-9948", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901214" } ], "notes": [ { "category": "description", "text": "A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9948" }, { "category": "external", "summary": "RHBZ#1901214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9948", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9948" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9948", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9948" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: type confusion may lead to arbitrary code execution" }, { "cve": "CVE-2020-9951", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901216" } ], "notes": [ { "category": "description", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9951" }, { "category": "external", "summary": "RHBZ#1901216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9951", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9951" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9951", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9951" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2020-9952", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901219" } ], "notes": [ { "category": "description", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: input validation issue may lead to a cross site scripting", "title": "Vulnerability summary" }, { "category": "other", "text": "webkit2gtk3 as shipped with Red Hat Enterprise Linux 8 is not affected by this flaw, as the version shipped is newer than the affected version range.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9952" }, { "category": "external", "summary": "RHBZ#1901219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9952", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9952" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9952", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9952" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: input validation issue may lead to a cross site scripting" }, { "cve": "CVE-2020-9983", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901221" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds write may lead to code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9983" }, { "category": "external", "summary": "RHBZ#1901221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901221" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9983", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9983" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9983", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9983" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: out-of-bounds write may lead to code execution" }, { "cve": "CVE-2020-13543", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903568" } ], "notes": [ { "category": "description", "text": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13543" }, { "category": "external", "summary": "RHBZ#1903568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903568" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0009.html", "url": "https://webkitgtk.org/security/WSA-2020-0009.html" } ], "release_date": "2020-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2020-13558", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1928886" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in the AudioSourceProviderGStreamer class of WebKitGTK and WPE WebKit in versions prior to 2.30.5. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13558" }, { "category": "external", "summary": "RHBZ#1928886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13558", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0001.html", "url": "https://webkitgtk.org/security/WSA-2021-0001.html" } ], "release_date": "2021-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution" }, { "cve": "CVE-2020-13584", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901212" } ], "notes": [ { "category": "description", "text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13584" }, { "category": "external", "summary": "RHBZ#1901212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13584", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13584" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13584", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13584" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2020-13753", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879570" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. The bubblewrap sandbox failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg- desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal\u2019s input buffer, similar to CVE-2017-5226. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13753" }, { "category": "external", "summary": "RHBZ#1879570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13753", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13753" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl" }, { "cve": "CVE-2020-27918", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944323" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27918" }, { "category": "external", "summary": "RHBZ#1944323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27918", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2020-29623", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944329" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A user may be unable to fully delete the browsing history under some circumstances. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: User may be unable to fully delete browsing history", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29623" }, { "category": "external", "summary": "RHBZ#1944329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29623", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: User may be unable to fully delete browsing history" }, { "cve": "CVE-2021-1765", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944333" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: IFrame sandboxing policy violation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1765" }, { "category": "external", "summary": "RHBZ#1944333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1765", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1765" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: IFrame sandboxing policy violation" }, { "cve": "CVE-2021-1788", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944859" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1788" }, { "category": "external", "summary": "RHBZ#1944859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1788", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0003.html", "url": "https://webkitgtk.org/security/WSA-2021-0003.html" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-1789", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944337" } ], "notes": [ { "category": "description", "text": "A type confusion vulnerability was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1789" }, { "category": "external", "summary": "RHBZ#1944337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1789", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-05-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2021-1799", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944340" } ], "notes": [ { "category": "description", "text": "A port redirection issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A malicious website may be able to access restricted ports on arbitrary servers. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Access to restricted ports on arbitrary servers via port redirection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1799" }, { "category": "external", "summary": "RHBZ#1944340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1799", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1799" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Access to restricted ports on arbitrary servers via port redirection" }, { "cve": "CVE-2021-1801", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944343" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: IFrame sandboxing policy violation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1801" }, { "category": "external", "summary": "RHBZ#1944343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944343" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1801", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1801" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: IFrame sandboxing policy violation" }, { "cve": "CVE-2021-1817", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986852" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1817" }, { "category": "external", "summary": "RHBZ#1986852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986852" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1817", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1817" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1817", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1817" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption leading to arbitrary code execution" }, { "cve": "CVE-2021-1820", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986856" } ], "notes": [ { "category": "description", "text": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may result in the disclosure of process memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory initialization issue possibly leading to memory disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1820" }, { "category": "external", "summary": "RHBZ#1986856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1820", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1820" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory initialization issue possibly leading to memory disclosure" }, { "cve": "CVE-2021-1825", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986858" } ], "notes": [ { "category": "description", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iTunes 12.11.3 for Windows, iCloud for Windows 12.3, macOS Big Sur 11.3, Safari 14.1, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Input validation issue leading to cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1825" }, { "category": "external", "summary": "RHBZ#1986858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986858" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1825", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1825" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1825", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1825" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Input validation issue leading to cross site scripting attack" }, { "cve": "CVE-2021-1826", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986860" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to universal cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1826" }, { "category": "external", "summary": "RHBZ#1986860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1826", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1826" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to universal cross site scripting attack" }, { "cve": "CVE-2021-1844", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944862" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1844" }, { "category": "external", "summary": "RHBZ#1944862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944862" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1844", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1844" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1844", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1844" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0003.html", "url": "https://webkitgtk.org/security/WSA-2021-0003.html" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-1870", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944350" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1870" }, { "category": "external", "summary": "RHBZ#1944350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944350" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1870", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1870" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1870", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1870" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to arbitrary code execution" }, { "cve": "CVE-2021-1871", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944867" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1871" }, { "category": "external", "summary": "RHBZ#1944867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1871", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1871" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0003.html", "url": "https://webkitgtk.org/security/WSA-2021-0003.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to arbitrary code execution" }, { "cve": "CVE-2021-21775", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986863" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21775" }, { "category": "external", "summary": "RHBZ#1986863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21775", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21775" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution" }, { "cve": "CVE-2021-21779", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986866" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability exists in the way Webkit\u2019s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21779" }, { "category": "external", "summary": "RHBZ#1986866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986866" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21779", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21779" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution" }, { "cve": "CVE-2021-21806", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1980441" } ], "notes": [ { "category": "description", "text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21806" }, { "category": "external", "summary": "RHBZ#1980441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21806", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21806" }, { "category": "external", "summary": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214" } ], "release_date": "2021-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution" }, { "cve": "CVE-2021-30661", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986870" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a use-after-free in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30661" }, { "category": "external", "summary": "RHBZ#1986870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986870" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30661", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30661" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30661", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30661" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30663", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986872" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by an integer overflow in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Integer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30663" }, { "category": "external", "summary": "RHBZ#1986872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30663", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30663" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30663", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30663" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Integer overflow leading to arbitrary code execution" }, { "cve": "CVE-2021-30665", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986874" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a memory corruption issue in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30665" }, { "category": "external", "summary": "RHBZ#1986874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986874" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30665", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30665" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30665", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30665" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption leading to arbitrary code execution" }, { "cve": "CVE-2021-30666", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986877" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package are vulnerable to a buffer overflow caused by improper bounds checking by the WebKit component. By persuading a victim to visit a specially crafted Web site, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Buffer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30666" }, { "category": "external", "summary": "RHBZ#1986877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30666", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30666" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30666", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30666" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Buffer overflow leading to arbitrary code execution" }, { "cve": "CVE-2021-30682", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986879" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to leak of sensitive user information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30682" }, { "category": "external", "summary": "RHBZ#1986879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986879" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30682", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30682" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30682", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30682" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to leak of sensitive user information" }, { "cve": "CVE-2021-30689", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986881" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to universal cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30689" }, { "category": "external", "summary": "RHBZ#1986881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986881" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30689", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30689" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30689", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30689" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to universal cross site scripting attack" }, { "cve": "CVE-2021-30720", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986883" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious website may be able to access restricted ports on arbitrary servers.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30720" }, { "category": "external", "summary": "RHBZ#1986883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30720", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30720" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers" }, { "cve": "CVE-2021-30734", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986886" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruptions leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30734" }, { "category": "external", "summary": "RHBZ#1986886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986886" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30734", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30734" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30734", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30734" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruptions leading to arbitrary code execution" }, { "cve": "CVE-2021-30744", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986888" } ], "notes": [ { "category": "description", "text": "Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30744" }, { "category": "external", "summary": "RHBZ#1986888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986888" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30744", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30744" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30744", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30744" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack" }, { "cve": "CVE-2021-30749", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986890" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruptions leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30749" }, { "category": "external", "summary": "RHBZ#1986890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30749", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30749" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruptions leading to arbitrary code execution" }, { "cve": "CVE-2021-30758", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986892" } ], "notes": [ { "category": "description", "text": "A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Type confusion leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30758" }, { "category": "external", "summary": "RHBZ#1986892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30758", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30758" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30758", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30758" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Type confusion leading to arbitrary code execution" }, { "cve": "CVE-2021-30761", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986894" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by memory corruption in the WebKit component. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30761" }, { "category": "external", "summary": "RHBZ#1986894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986894" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30761", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30761" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30761", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30761" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption leading to arbitrary code execution" }, { "cve": "CVE-2021-30762", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986898" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a use-after-free in the WebKit component. By persuading a victim to visit a specially crafted Web site, an attacker can execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30762" }, { "category": "external", "summary": "RHBZ#1986898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30762", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30762" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30795", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986900" } ], "notes": [ { "category": "description", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30795" }, { "category": "external", "summary": "RHBZ#1986900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30795", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30795" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30795", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30795" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30797", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986902" } ], "notes": [ { "category": "description", "text": "This issue was addressed with improved checks. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Insufficient checks leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30797" }, { "category": "external", "summary": "RHBZ#1986902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986902" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30797", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30797" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Insufficient checks leading to arbitrary code execution" }, { "cve": "CVE-2021-30799", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986906" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruptions leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30799" }, { "category": "external", "summary": "RHBZ#1986906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986906" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30799", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30799" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruptions leading to arbitrary code execution" }, { "cve": "CVE-2021-30809", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034347" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30809" }, { "category": "external", "summary": "RHBZ#2034347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30809", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30818", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034368" } ], "notes": [ { "category": "description", "text": "A confusion type flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30818" }, { "category": "external", "summary": "RHBZ#2034368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30818", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30823", "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034373" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK. An attacker in a privileged network position could use this flaw to bypass HSTS.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to HSTS bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30823" }, { "category": "external", "summary": "RHBZ#2034373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30823", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to HSTS bypass" }, { "cve": "CVE-2021-30836", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034376" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in WebKitGTK. A specially crafted audio file could use this flaw to trigger a disclosure of memory when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Out-of-bounds read leading to memory disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30836" }, { "category": "external", "summary": "RHBZ#2034376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30836", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30836" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: Out-of-bounds read leading to memory disclosure" }, { "cve": "CVE-2021-30846", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2017898" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30846" }, { "category": "external", "summary": "RHBZ#2017898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30846", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30846" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0006.html", "url": "https://webkitgtk.org/security/WSA-2021-0006.html" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30848", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2017901" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30848" }, { "category": "external", "summary": "RHBZ#2017901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30848", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30848" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0006.html", "url": "https://webkitgtk.org/security/WSA-2021-0006.html" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30849", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2017904" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30849" }, { "category": "external", "summary": "RHBZ#2017904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30849", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30851", "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2018573" } ], "notes": [ { "category": "description", "text": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30851" }, { "category": "external", "summary": "RHBZ#2018573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30851", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0006.html", "url": "https://webkitgtk.org/security/WSA-2021-0006.html" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30884", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034378" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way WebKitGTK performed CSS compositing. A malicious web site could possibly use this flaw to reveal user\u0027s browsing history.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: CSS compositing issue leading to revealing of the browsing history", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30884" }, { "category": "external", "summary": "RHBZ#2034378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30884", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: CSS compositing issue leading to revealing of the browsing history" }, { "cve": "CVE-2021-30887", "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034381" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK. A specially crafted web content could use this flaw to bypass Content Security Policy bypass when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to Content Security Policy bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30887" }, { "category": "external", "summary": "RHBZ#2034381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30887", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30887" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to Content Security Policy bypass" }, { "cve": "CVE-2021-30888", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034383" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in WebKitGTK. A malicious web site using Content Security Policy reports could use this flaw to leak information via redirects.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Information leak via Content Security Policy reports", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30888" }, { "category": "external", "summary": "RHBZ#2034383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30888", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Information leak via Content Security Policy reports" }, { "cve": "CVE-2021-30889", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034386" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Buffer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30889" }, { "category": "external", "summary": "RHBZ#2034386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30889", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30889" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Buffer overflow leading to arbitrary code execution" }, { "cve": "CVE-2021-30890", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034389" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK. Specially crafted web content could use this flaw to trigger a universal cross-site scripting when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to universal cross-site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30890" }, { "category": "external", "summary": "RHBZ#2034389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30890", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30890" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to universal cross-site scripting" }, { "cve": "CVE-2021-30897", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2038907" } ], "notes": [ { "category": "description", "text": "A flaw was found in the resource timing API specification and its implementation in WebKitGTK. A malicious web site could use this flaw to trigger a cross-domain data exfiltration.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Cross-origin data exfiltration via resource timing API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30897" }, { "category": "external", "summary": "RHBZ#2038907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30897", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Cross-origin data exfiltration via resource timing API" }, { "cve": "CVE-2021-30934", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044521" } ], "notes": [ { "category": "description", "text": "A buffer overflow vulnerability was found in webkitgtk. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash or lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30934" }, { "category": "external", "summary": "RHBZ#2044521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30934", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30934" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30936", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044528" } ], "notes": [ { "category": "description", "text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30936" }, { "category": "external", "summary": "RHBZ#2044528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30936", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30936" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30951", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044534" } ], "notes": [ { "category": "description", "text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30951" }, { "category": "external", "summary": "RHBZ#2044534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30951", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30951" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30952", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044538" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, which can lead to an integer overflow. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30952" }, { "category": "external", "summary": "RHBZ#2044538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30952", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30952" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30953", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044542" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper bounds checking, which can lead to an out-of-bounds read vulnerability. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30953" }, { "category": "external", "summary": "RHBZ#2044542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30953", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30953" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30954", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044551" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper memory handling, which can lead to a type confusion issue. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30954" }, { "category": "external", "summary": "RHBZ#2044551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30954", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30954" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30984", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044553" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper state handling, which can lead to a race condition. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30984" }, { "category": "external", "summary": "RHBZ#2044553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30984", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30984" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-42762", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2016673" } ], "notes": [ { "category": "description", "text": "BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is limited to host services that create UNIX sockets that WebKit mounts inside its sandbox, and the sandboxed process remains otherwise confined. NOTE: this is similar to CVE-2021-41133.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: limited sandbox escape via VFS syscalls", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-42762" }, { "category": "external", "summary": "RHBZ#2016673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016673" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-42762", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42762" } ], "release_date": "2021-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: limited sandbox escape via VFS syscalls" }, { "cve": "CVE-2021-45481", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2040327" } ], "notes": [ { "category": "description", "text": "A segmentation violation vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45481" }, { "category": "external", "summary": "RHBZ#2040327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45481", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45481" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481" } ], "release_date": "2021-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create" }, { "cve": "CVE-2021-45482", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2040329" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45482" }, { "category": "external", "summary": "RHBZ#2040329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45482", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45482" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482" } ], "release_date": "2021-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild" }, { "cve": "CVE-2021-45483", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2040331" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free in WebCore::Frame::page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45483" }, { "category": "external", "summary": "RHBZ#2040331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45483", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45483" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483" } ], "release_date": "2021-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free in WebCore::Frame::page" }, { "cve": "CVE-2022-0108", "discovery_date": "2022-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2037469" } ], "notes": [ { "category": "description", "text": "Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Inappropriate implementation in Navigation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0108" }, { "category": "external", "summary": "RHBZ#2037469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0108", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108" } ], "release_date": "2022-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Inappropriate implementation in Navigation" }, { "cve": "CVE-2022-22589", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053179" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. The vulnerability exists due to improper input validation in WebKit when processing email messages. This flaw allows a remote attacker to trick the victim into opening a specially crafted email message and execute arbitrary JavaScript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22589" }, { "category": "external", "summary": "RHBZ#2053179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22589", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22589" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0002.html", "url": "https://webkitgtk.org/security/WSA-2022-0002.html" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript" }, { "cve": "CVE-2022-22590", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053181" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22590" }, { "category": "external", "summary": "RHBZ#2053181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22590", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22590" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0002.html", "url": "https://webkitgtk.org/security/WSA-2022-0002.html" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2022-22592", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "discovery_date": "2022-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053185" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. The flaw exists due to a logic issue when processing HTML content in WebKit. This flaw allows a remote attacker to create a specially crafted web page, trick the victim into visiting it, and prevent the Content Security Policy from being enforced, allowing the remote attacker to bypass implemented security restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22592" }, { "category": "external", "summary": "RHBZ#2053185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22592", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22592" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0002.html", "url": "https://webkitgtk.org/security/WSA-2022-0002.html" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced" }, { "cve": "CVE-2022-22594", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2045291" } ], "notes": [ { "category": "description", "text": "A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22594" }, { "category": "external", "summary": "RHBZ#2045291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22594", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2022-22620", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056474" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a use-after-free error and leading to the execution of arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22620" }, { "category": "external", "summary": "RHBZ#2056474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22620", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0003.html", "url": "https://webkitgtk.org/security/WSA-2022-0003.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2022-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-02-11T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free" }, { "cve": "CVE-2022-22624", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073893" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22624" }, { "category": "external", "summary": "RHBZ#2073893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22624", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22624" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-22628", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073896" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22628" }, { "category": "external", "summary": "RHBZ#2073896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22628", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22628" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-22629", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073899" } ], "notes": [ { "category": "description", "text": "A buffer overflow vulnerability was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Buffer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22629" }, { "category": "external", "summary": "RHBZ#2073899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Buffer overflow leading to arbitrary code execution" }, { "cve": "CVE-2022-22637", "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073903" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: logic issue was addressed with improved state management", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22637" }, { "category": "external", "summary": "RHBZ#2073903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22637", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22637" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: logic issue was addressed with improved state management" }, { "cve": "CVE-2022-22662", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104787" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where an issue occurs due to improper cookie management. This flaw allows a remote attacker to trick the victim into parsing maliciously crafted web content, triggering the vulnerability and gaining access to potentially sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Cookie management issue leading to sensitive user information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22662" }, { "category": "external", "summary": "RHBZ#2104787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22662", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22662" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Cookie management issue leading to sensitive user information disclosure" }, { "cve": "CVE-2022-22677", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104788" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs due to a logic issue in video self-preview feature in a webRTC call, which can be interrupted if the user answers a phone call or the audio capture is interrupted. This flaw allows a remote attacker to perform a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability does not affect RHEL because WebRTC code is not included in any WebKitGTK releases thus far.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22677" }, { "category": "external", "summary": "RHBZ#2104788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22677", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22677" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted" }, { "cve": "CVE-2022-26700", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092732" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26700" }, { "category": "external", "summary": "RHBZ#2092732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26700", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26700" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-26709", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092733" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26709" }, { "category": "external", "summary": "RHBZ#2092733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26709", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26709" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26710", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104789" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in WebKitGTK. The flaw occurs when processing maliciously crafted HTML content in WebKit. This flaw allows a remote attacker to trick the victim into visiting a specially crafted website, triggering memory corruption and executing arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26710" }, { "category": "external", "summary": "RHBZ#2104789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26710", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26716", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092734" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26716" }, { "category": "external", "summary": "RHBZ#2092734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26716", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-26717", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092735" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26717" }, { "category": "external", "summary": "RHBZ#2092735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26719", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092736" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26719" }, { "category": "external", "summary": "RHBZ#2092736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26719", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-30293", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082548" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow vulnerability was found in WebKitGTK. The vulnerability occurs when processing or rendering HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a heap buffer overflow error and leading to the execution of arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30293" }, { "category": "external", "summary": "RHBZ#2082548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30293", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30293" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293" } ], "release_date": "2022-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution" }, { "cve": "CVE-2022-30294", "discovery_date": "2022-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082544" } ], "notes": [ { "category": "description", "text": "[REJECTED CVE] In WebKitGTK through 2.36.0 (and WPE WebKit), there is a use-after-free in WebCore::TextureMapperLayer::setContentsLayer in WebCore/platform/graphics/texmap/TextureMapperLayer.cpp.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw was found to be a duplicate of CVE-2022-30293. Please see https://access.redhat.com/security/cve/CVE-2022-30293 for information about affected products and security errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30294" }, { "category": "external", "summary": "RHBZ#2082544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082544" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30294", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30294" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30294", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30294" } ], "release_date": "2022-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 0.0, "baseSeverity": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "title": "webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer" }, { "cve": "CVE-2022-32792", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238973" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. This issue occurs when processing maliciously crafted web content which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32792" }, { "category": "external", "summary": "RHBZ#2238973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32792", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32792" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2022-0007.html", "url": "https://wpewebkit.org/security/WSA-2022-0007.html" } ], "release_date": "2022-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2022-32816", "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238975" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. This issue occurs when visiting a website that frames malicious content, which may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: malicious content may lead to UI spoofing", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32816" }, { "category": "external", "summary": "RHBZ#2238975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32816", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2022-0007.html", "url": "https://wpewebkit.org/security/WSA-2022-0007.html" } ], "release_date": "2022-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: malicious content may lead to UI spoofing" }, { "cve": "CVE-2022-32885", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236842" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue when processing web content", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32885" }, { "category": "external", "summary": "RHBZ#2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue when processing web content" }, { "cve": "CVE-2022-32886", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128643" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtkm, where a buffer overflow issue was addressed with improved memory handling. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: buffer overflow issue was addressed with improved memory handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32886" }, { "category": "external", "summary": "RHBZ#2128643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32886", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0009.html", "url": "https://webkitgtk.org/security/WSA-2022-0009.html" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: buffer overflow issue was addressed with improved memory handling" }, { "cve": "CVE-2022-32888", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140501" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32888" }, { "category": "external", "summary": "RHBZ#2140501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32888", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking" }, { "cve": "CVE-2022-32891", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128647" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: UI spoofing while Visiting a website that frames malicious content", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32891" }, { "category": "external", "summary": "RHBZ#2128647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32891", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32891" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0009.html", "url": "https://webkitgtk.org/security/WSA-2022-0009.html" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: UI spoofing while Visiting a website that frames malicious content" }, { "cve": "CVE-2022-32893", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2121645" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to an out-of-bounds write. This flaw allows an attacker with network access to pass specially crafted web content files, causing arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Since Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32893" }, { "category": "external", "summary": "RHBZ#2121645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32893", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32893" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32893", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32893" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0008.html", "url": "https://webkitgtk.org/security/WSA-2022-0008.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2022-08-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-08-18T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2022-32912", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128645" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32912" }, { "category": "external", "summary": "RHBZ#2128645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32912", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32912" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32912", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32912" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0009.html", "url": "https://webkitgtk.org/security/WSA-2022-0009.html" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2022-32919", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271437" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK and WPE WebKit that allows a remote attacker to conduct spoofing attacks by exploiting improper UI handling. This flaw enables attackers to create specially crafted websites that can display misleading information to users. By exploiting this vulnerability, an attacker can trick users into believing they are interacting with a legitimate website, potentially leading to a UI spoofing attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32919" }, { "category": "external", "summary": "RHBZ#2271437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271437" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32919", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32919" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32919", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32919" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing." }, { "cve": "CVE-2022-32923", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140502" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. Processing maliciously crafted web content may disclose the internal states of the app.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: correctness issue in the JIT was addressed with improved checks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32923" }, { "category": "external", "summary": "RHBZ#2140502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32923", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: correctness issue in the JIT was addressed with improved checks" }, { "cve": "CVE-2022-32933", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271441" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk where a website may be able to track the websites a user visited in private browsing mode.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A website may able to track visited websites in private browsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32933" }, { "category": "external", "summary": "RHBZ#2271441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32933", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32933" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32933", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32933" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A website may able to track visited websites in private browsing" }, { "cve": "CVE-2022-42799", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: issue was addressed with improved UI handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42799" }, { "category": "external", "summary": "RHBZ#2140503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42799", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: issue was addressed with improved UI handling" }, { "cve": "CVE-2022-42823", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140505" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where a logic issue was addressed with improved state management. Processing maliciously crafted web content may disclose sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42823" }, { "category": "external", "summary": "RHBZ#2140505", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42823", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2022-42824", "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140504" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: sensitive information disclosure issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42824" }, { "category": "external", "summary": "RHBZ#2140504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42824", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42824" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: sensitive information disclosure issue" }, { "cve": "CVE-2022-42826", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2167716" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue exists due to a use-after-free error when processing maliciously crafted web content in WebKit. This may allow an attacker to trick the victim to visit a specially crafted website, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42826" }, { "category": "external", "summary": "RHBZ#2167716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42826", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0001.html", "url": "https://webkitgtk.org/security/WSA-2023-0001.html" } ], "release_date": "2023-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: use-after-free issue leading to arbitrary code execution" }, { "cve": "CVE-2022-42852", "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156986" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory disclosure issue was addressed with improved memory handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42852" }, { "category": "external", "summary": "RHBZ#2156986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42852", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory disclosure issue was addressed with improved memory handling" }, { "cve": "CVE-2022-42856", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2022-12-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2153683" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42856" }, { "category": "external", "summary": "RHBZ#2153683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153683" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42856", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42856" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42856", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42856" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2022-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Setting the environment variable JSC_useFTLJIT=0 will disable the vulnerable code. (This will also somewhat slow down JavaScript execution.)", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-12-14T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution" }, { "cve": "CVE-2022-42863", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156987" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42863" }, { "category": "external", "summary": "RHBZ#2156987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42863", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42863" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-42867", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156989" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42867" }, { "category": "external", "summary": "RHBZ#2156989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42867", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42867" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46691", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156990" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46691" }, { "category": "external", "summary": "RHBZ#2156990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46691", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46691" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46692", "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156991" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Same Origin Policy bypass issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46692" }, { "category": "external", "summary": "RHBZ#2156991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46692", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46692" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Same Origin Policy bypass issue" }, { "cve": "CVE-2022-46698", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156992" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows an attacker to process maliciously crafted web content that may disclose sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: logic issue leading to user information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46698" }, { "category": "external", "summary": "RHBZ#2156992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46698", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: logic issue leading to user information disclosure" }, { "cve": "CVE-2022-46699", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156993" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46699" }, { "category": "external", "summary": "RHBZ#2156993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46699", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46699" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46700", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156994" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46700" }, { "category": "external", "summary": "RHBZ#2156994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46700", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46700" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271444" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This flaw allows a remote attacker to bypass security restrictions and spoof the user\u0027s address bar. This issue occurs when a victim is persuaded to access a specially crafted website due to improper handling of URLs.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46705" }, { "category": "external", "summary": "RHBZ#2271444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46705" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2022-46725", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271446" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This flaw occurs due to an issue in the component URL Handler, which allows a remote attacker to manipulate an unknown input that can lead to clickjacking.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46725" }, { "category": "external", "summary": "RHBZ#2271446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271446" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46725" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing." }, { "cve": "CVE-2022-48503", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218623" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: improper bounds checking leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-48503" }, { "category": "external", "summary": "RHBZ#2218623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48503", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: improper bounds checking leading to arbitrary code execution" }, { "cve": "CVE-2023-23517", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2167717" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-23517" }, { "category": "external", "summary": "RHBZ#2167717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23517", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0001.html", "url": "https://webkitgtk.org/security/WSA-2023-0001.html" } ], "release_date": "2023-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2023-23518", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2167715" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-23518" }, { "category": "external", "summary": "RHBZ#2167715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23518", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0001.html", "url": "https://webkitgtk.org/security/WSA-2023-0001.html" } ], "release_date": "2023-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2023-23529", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2169934" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may, in theory, allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger type confusion, and execute arbitrary code on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-23529" }, { "category": "external", "summary": "RHBZ#2169934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169934" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23529", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23529" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23529", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23529" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0002.html", "url": "https://webkitgtk.org/security/WSA-2023-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-02-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Setting the environment variable JSC_useDFGJIT=0 will mitigate this issue.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-02-14T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution" }, { "cve": "CVE-2023-25358", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2175099" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-25358" }, { "category": "external", "summary": "RHBZ#2175099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-25358", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25358" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358" }, { "category": "external", "summary": "https://bugs.webkit.org/show_bug.cgi?id=242683", "url": "https://bugs.webkit.org/show_bug.cgi?id=242683" } ], "release_date": "2022-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()" }, { "cve": "CVE-2023-27932", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236843" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may bypass the same-origin Policy.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Same Origin Policy bypass via crafted web content", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-27932" }, { "category": "external", "summary": "RHBZ#2236843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236843" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-27932", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27932" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27932", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27932" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Same Origin Policy bypass via crafted web content" }, { "cve": "CVE-2023-27954", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236844" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue leads to tracking sensitive user information via a website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Website may be able to track sensitive user information", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-27954" }, { "category": "external", "summary": "RHBZ#2236844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236844" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-27954", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27954" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27954", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27954" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Website may be able to track sensitive user information" }, { "cve": "CVE-2023-28198", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238943" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. When processing web content, it may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use after free vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-28198" }, { "category": "external", "summary": "RHBZ#2238943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-28198", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0008.html", "url": "https://webkitgtk.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use after free vulnerability" }, { "cve": "CVE-2023-28204", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2209208" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. An out of bounds read may be possible when processing malicious web content, which can lead to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: an out-of-bounds read when processing malicious content", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-28204" }, { "category": "external", "summary": "RHBZ#2209208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-28204", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-05-22T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: an out-of-bounds read when processing malicious content" }, { "cve": "CVE-2023-28205", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2185724" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. An improper input validation issue may lead to a use-after-free vulnerability. This vulnerability allows attackers with network access to pass specially crafted web content files, causing Denial of Service or Arbitrary Code Execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "WebKitGTK: use-after-free leads to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-28205" }, { "category": "external", "summary": "RHBZ#2185724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-28205", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28205" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-6qjh-p74q-89mv", "url": "https://github.com/advisories/GHSA-6qjh-p74q-89mv" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-04-10T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "WebKitGTK: use-after-free leads to arbitrary code execution" }, { "cve": "CVE-2023-32359", "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271449" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk where a user\u2019s password may be read aloud by a text-to-speech accessibility feature.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: User password may be read aloud by a text-to-speech accessibility feature", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32359" }, { "category": "external", "summary": "RHBZ#2271449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271449" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32359", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32359" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32359", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32359" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: User password may be read aloud by a text-to-speech accessibility feature" }, { "cve": "CVE-2023-32370", "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238944" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. A logic issue was addressed with improved validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: content security policy blacklist failure", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32370" }, { "category": "external", "summary": "RHBZ#2238944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238944" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32370", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32370" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32370", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32370" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0008.html", "url": "https://webkitgtk.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: content security policy blacklist failure" }, { "cve": "CVE-2023-32373", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2209214" } ], "notes": [ { "category": "description", "text": "A use after free vulnerability was found in the webkitgtk package. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: a use-after-free when processing maliciously crafted web content", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32373" }, { "category": "external", "summary": "RHBZ#2209214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32373", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32373" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-05-22T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: a use-after-free when processing maliciously crafted web content" }, { "cve": "CVE-2023-32393", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-07-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2224608" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32393" }, { "category": "external", "summary": "RHBZ#2224608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224608" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32393", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32393" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32393", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32393" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0006.html", "url": "https://webkitgtk.org/security/WSA-2023-0006.html" } ], "release_date": "2023-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-32435", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218626" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32435" }, { "category": "external", "summary": "RHBZ#2218626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32435", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0005.html", "url": "https://webkitgtk.org/security/WSA-2023-0005.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-06-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2023-32439", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218640" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing maliciously crafted web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32439" }, { "category": "external", "summary": "RHBZ#2218640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32439", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0005.html", "url": "https://webkitgtk.org/security/WSA-2023-0005.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useDFGJIT=0, which will disable the data flow graph JIT tier. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-06-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2023-35074", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241403" } ], "notes": [ { "category": "description", "text": "The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-35074" }, { "category": "external", "summary": "RHBZ#2241403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-35074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-37450", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2223000" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37450" }, { "category": "external", "summary": "RHBZ#2223000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37450", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-07-13T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38133", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231015" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK, which exists due to excessive data output in WebKit Process Model. This issue occurs when processing malicious web content, which may lead to sensitive information disclosure to unauthorized attackers.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: disclose sensitive information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38133" }, { "category": "external", "summary": "RHBZ#2231015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38133", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38133" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38133", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38133" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: disclose sensitive information" }, { "cve": "CVE-2023-38572", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231028" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This flaw exists due to an error when handling the Same Origin Policy. A remote attacker can bypass Same Origin Policy restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: bypass Same Origin Policy", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38572" }, { "category": "external", "summary": "RHBZ#2231028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38572", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38572" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38572", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38572" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: bypass Same Origin Policy" }, { "cve": "CVE-2023-38592", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231017" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38592" }, { "category": "external", "summary": "RHBZ#2231017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231017" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38592", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38592" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38592", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38592" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-38594", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231018" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38594" }, { "category": "external", "summary": "RHBZ#2231018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38594", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38595", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231019" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38595" }, { "category": "external", "summary": "RHBZ#2231019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38595", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38595" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38597", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231043" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38597" }, { "category": "external", "summary": "RHBZ#2231043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231043" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38597", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38597" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38597", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38597" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38599", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231020" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK, which exists due to a logic issue in WebKit related to a user\u0027s privacy. A remote attacker may be able to track sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: track sensitive user information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38599" }, { "category": "external", "summary": "RHBZ#2231020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38599", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38599" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38599", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38599" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: track sensitive user information" }, { "cve": "CVE-2023-38600", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231021" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38600" }, { "category": "external", "summary": "RHBZ#2231021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231021" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38600", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38600" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38600", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38600" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38611", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231022" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38611" }, { "category": "external", "summary": "RHBZ#2231022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38611", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38611" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38611", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38611" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-39928", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241400" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the WebKitGTK\u0027s MediaRecorder API that may lead to memory corruption and Remote Code Execution. The victim needs to access a malicious web page to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-39928" }, { "category": "external", "summary": "RHBZ#2241400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241400" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-39928", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39928" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39928", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39928" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0009.html", "url": "https://webkitgtk.org/security/WSA-2023-0009.html" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports" }, { "cve": "CVE-2023-40397", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238945" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary javascript code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40397" }, { "category": "external", "summary": "RHBZ#2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40397" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2023-0008.html", "url": "https://wpewebkit.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: arbitrary javascript code execution" }, { "cve": "CVE-2023-40414", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270143" } ], "notes": [ { "category": "description", "text": "A vulnerability in WebKitGTK and WPE WebKit could allow an attacker to execute arbitrary code on a target system. The issue arises from a use-after-free flaw in memory management when processing web content. This flaw can potentially give attackers the ability to take control of affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40414" }, { "category": "external", "summary": "RHBZ#2270143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270143" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40414", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40414" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40414", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40414" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-40451", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241409" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. An attacker may be able to execute JavaScript code to trigger Remote Code Execution, resulting in a high impact on data confidentiality, integrity, and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40451" }, { "category": "external", "summary": "RHBZ#2241409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40451", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40451" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40451", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40451" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0009.html", "url": "https://webkitgtk.org/security/WSA-2023-0009.html" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code" }, { "cve": "CVE-2023-41074", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241412" } ], "notes": [ { "category": "description", "text": "The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41074" }, { "category": "external", "summary": "RHBZ#2241412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-41983", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271453" } ], "notes": [ { "category": "description", "text": "A vulnerability in WebKitGTK and WPE WebKit may result in a denial-of-service when processing web content. This issue arises from improper memory handling, which could be exploited by attackers to crash the affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41983" }, { "category": "external", "summary": "RHBZ#2271453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41983", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41983" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41983", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41983" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial of service" }, { "cve": "CVE-2023-41993", "discovery_date": "2023-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2240522" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing malicious web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue doesn\u0027t affect the versions of webkitgtk as shipped with Red Hat Enterprise Linux 8 and 9 as the flaw relies on JIT engine. JIT was disabled in the past when the fixes for CVE-2023-32435 and CVE-2023-32439 were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41993" }, { "category": "external", "summary": "RHBZ#2240522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41993", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41993" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-09-25T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing malicious web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42833", "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270146" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This flaw allows a remote attacker to trigger arbitrary code execution by persuading a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated Important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42833" }, { "category": "external", "summary": "RHBZ#2270146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42833", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42833" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42843", "discovery_date": "2024-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271717" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit that may allow a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. By tricking a victim into visiting a specially crafted website, the attacker could perform address bar spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42843" }, { "category": "external", "summary": "RHBZ#2271717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271717" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42843", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42843" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0002.html", "url": "https://webkitgtk.org/security/WSA-2024-0002.html" } ], "release_date": "2024-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2023-42852", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271456" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42852" }, { "category": "external", "summary": "RHBZ#2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42875", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T12:59:19.828000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366497" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42875" }, { "category": "external", "summary": "RHBZ#2366497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42883", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2254326" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing a malicious image, which could result in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing a malicious image may lead to a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42883" }, { "category": "external", "summary": "RHBZ#2254326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254326" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42883", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42883" } ], "release_date": "2023-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing a malicious image may lead to a denial of service" }, { "cve": "CVE-2023-42890", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2254327" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing malicious HTML content in WebKit, which could result in memory corruption and arbitrary code execution on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing malicious web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While the discovered flaw in WebKitGTK does indeed present a concerning potential for arbitrary code execution due to memory corruption, its severity is assessed as moderate rather than critical for several reasons. Firstly, successful exploitation of the vulnerability requires the user to interact with malicious HTML content, typically through visiting a compromised website. This dependency on user interaction reduces the likelihood of widespread exploitation compared to vulnerabilities that can be remotely exploited without user interaction. Additionally, the impact of the flaw may be mitigated by various security measures such as sandboxing or Content Security Policy (CSP) enforcement, which can limit the execution environment for potentially malicious code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42890" }, { "category": "external", "summary": "RHBZ#2254327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254327" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42890", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42890" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42890", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42890" } ], "release_date": "2023-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing malicious web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42916", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253054" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may cause an out-of-bounds read due to an improper input validation, resulting in sensitive content leaking.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Out-of-bounds read leads to sensitive data leak", "title": "Vulnerability summary" }, { "category": "other", "text": "The WebKitGTK package versions, as shipped with Red Hat Enterprise 8 and 9, are not affected by this vulnerability. This flaw is related to the JIT code, which is currently disabled by default on both Red Hat Enterprise Linux versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42916" }, { "category": "external", "summary": "RHBZ#2253054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42916", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Out-of-bounds read leads to sensitive data leak" }, { "cve": "CVE-2023-42917", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253058" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Arbitrary Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42917" }, { "category": "external", "summary": "RHBZ#2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42917" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0011.html", "url": "https://webkitgtk.org/security/WSA-2023-0011.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Arbitrary Remote Code Execution" }, { "cve": "CVE-2023-42950", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271718" } ], "notes": [ { "category": "description", "text": "A heap use-after-free vulnerability was found in WebKit. Exploiting this flaw involves processing maliciously crafted web content, which may result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: heap use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42950" }, { "category": "external", "summary": "RHBZ#2271718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271718" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42950", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42950" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0002.html", "url": "https://webkitgtk.org/security/WSA-2024-0002.html" } ], "release_date": "2024-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: heap use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2023-42956", "discovery_date": "2024-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271719" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This issue may allow an attacker to trigger a denial of service condition by convincing a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing malicious web content may lead to a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42956" }, { "category": "external", "summary": "RHBZ#2271719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271719" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42956", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42956" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42956", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42956" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0002.html", "url": "https://webkitgtk.org/security/WSA-2024-0002.html" } ], "release_date": "2024-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing malicious web content may lead to a denial of service" }, { "cve": "CVE-2023-42970", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:01:32.590000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366498" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42970" }, { "category": "external", "summary": "RHBZ#2366498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42970" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-4558", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2279689" } ], "notes": [ { "category": "description", "text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in ANGLE", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4558" }, { "category": "external", "summary": "RHBZ#2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558" } ], "release_date": "2024-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in ANGLE" }, { "cve": "CVE-2024-23213", "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270141" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK\u00a0. This flaw allows a remote attacker to trigger arbitrary code execution by persuading a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23213" }, { "category": "external", "summary": "RHBZ#2270141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23213", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23213" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-23222", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259893" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23222" }, { "category": "external", "summary": "RHBZ#2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-01-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion may lead to arbitrary code execution" }, { "cve": "CVE-2024-23252", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270288" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows an attacker to trigger a denial of service condition by convincing a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing malicious web content may lead to denial-of-service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23252" }, { "category": "external", "summary": "RHBZ#2270288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23252", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23252" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing malicious web content may lead to denial-of-service" }, { "cve": "CVE-2024-23254", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270289" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit, where a remote attacker is able to exfiltrate audio data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: malicious website may exfiltrate audio data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23254" }, { "category": "external", "summary": "RHBZ#2270289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: malicious website may exfiltrate audio data cross-origin" }, { "cve": "CVE-2024-23263", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270290" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic issue by convincing a victim to visit a specially crafted website. This results in the attacker evading the Content Security Policy enforcement.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing malicious web content prevents Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23263" }, { "category": "external", "summary": "RHBZ#2270290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23263", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23263" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing malicious web content prevents Content Security Policy from being enforced" }, { "cve": "CVE-2024-23271", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2024-09-25T15:33:21.499000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314696" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows a remote attacker to trigger unexpected cross-origin behavior via a malicious website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may cause unexpected cross-origin behavior", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23271" }, { "category": "external", "summary": "RHBZ#2314696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23271", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23271" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may cause unexpected cross-origin behavior" }, { "cve": "CVE-2024-23280", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270291" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions through an injection issue by persuading a victim to access a specially crafted website, enabling the attackers to fingerprint the user.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23280" }, { "category": "external", "summary": "RHBZ#2270291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23280", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23280" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2024-23284", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270292" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic flaw by persuading a victim to access a specially crafted website, enabling attackers to circumvent the Content Security Policy enforcement.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23284" }, { "category": "external", "summary": "RHBZ#2270292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23284", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced" }, { "cve": "CVE-2024-27808", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:36:18.356000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314697" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27808" }, { "category": "external", "summary": "RHBZ#2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27820", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:37:48.081000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314698" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27820" }, { "category": "external", "summary": "RHBZ#2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27833", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:40:34.042000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314700" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27833" }, { "category": "external", "summary": "RHBZ#2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27834", "cwe": { "id": "CWE-288", "name": "Authentication Bypass Using an Alternate Path or Channel" }, "discovery_date": "2024-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2282412" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Webkit. This flaw allows an attacker with arbitrary read and write capability to bypass pointer authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: pointer authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27834" }, { "category": "external", "summary": "RHBZ#2282412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27834" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0003.html", "url": "https://webkitgtk.org/security/WSA-2024-0003.html" } ], "release_date": "2024-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: pointer authentication bypass" }, { "cve": "CVE-2024-27838", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2024-09-25T15:42:35.706000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314702" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This vulnerability allows a maliciously crafted webpage to fingerprint the user.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27838" }, { "category": "external", "summary": "RHBZ#2314702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27838", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2024-27851", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:44:41.235000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314704" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27851" }, { "category": "external", "summary": "RHBZ#2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27856", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2025-02-10T09:34:34.705418+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344618" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27856" }, { "category": "external", "summary": "RHBZ#2344618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27856" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856" }, { "category": "external", "summary": "https://support.apple.com/en-us/120896", "url": "https://support.apple.com/en-us/120896" }, { "category": "external", "summary": "https://support.apple.com/en-us/120898", "url": "https://support.apple.com/en-us/120898" }, { "category": "external", "summary": "https://support.apple.com/en-us/120901", "url": "https://support.apple.com/en-us/120901" }, { "category": "external", "summary": "https://support.apple.com/en-us/120902", "url": "https://support.apple.com/en-us/120902" }, { "category": "external", "summary": "https://support.apple.com/en-us/120903", "url": "https://support.apple.com/en-us/120903" }, { "category": "external", "summary": "https://support.apple.com/en-us/120905", "url": "https://support.apple.com/en-us/120905" }, { "category": "external", "summary": "https://support.apple.com/en-us/120906", "url": "https://support.apple.com/en-us/120906" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-15T19:35:57.075000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution" }, { "cve": "CVE-2024-40776", "discovery_date": "2024-07-30T20:48:03+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301841" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40776" }, { "category": "external", "summary": "RHBZ#2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html", "url": "https://webkitgtk.org/security/WSA-2024-0004.html" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution" }, { "cve": "CVE-2024-40779", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:05:50+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302070" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40779" }, { "category": "external", "summary": "RHBZ#2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40780", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:07:22+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302069" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40780" }, { "category": "external", "summary": "RHBZ#2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40782", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-07-31T14:57:24+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302071" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40782" }, { "category": "external", "summary": "RHBZ#2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management" }, { "cve": "CVE-2024-40789", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:39:05+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302067" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40789" }, { "category": "external", "summary": "RHBZ#2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-40866", "discovery_date": "2024-09-17T00:31:06.549134+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2312724" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. The attacker could perform address bar spoofing by tricking a victim into visiting a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40866" }, { "category": "external", "summary": "RHBZ#2312724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866" }, { "category": "external", "summary": "https://support.apple.com/en-us/121238", "url": "https://support.apple.com/en-us/121238" }, { "category": "external", "summary": "https://support.apple.com/en-us/121241", "url": "https://support.apple.com/en-us/121241" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-17T00:15:49.840000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2024-44185", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T20:05:39.339000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323263" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44185" }, { "category": "external", "summary": "RHBZ#2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0006.html", "url": "https://webkitgtk.org/security/WSA-2024-0006.html" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44187", "discovery_date": "2024-09-25T15:50:57.927000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314706" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to exfiltrate data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44187" }, { "category": "external", "summary": "RHBZ#2314706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44187", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2024-44192", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-03-20T12:50:04.459000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2353871" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper checks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThis issue can cause an unexpected process crash. Additionally, there is no evidence of remote code execution but this possibility is not discarded.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44192" }, { "category": "external", "summary": "RHBZ#2353871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353871" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44192", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44192" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0002.html", "url": "https://webkitgtk.org/security/WSA-2025-0002.html" } ], "release_date": "2025-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44244", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T21:06:58.389000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323278" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44244" }, { "category": "external", "summary": "RHBZ#2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244" } ], "release_date": "2024-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44296", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2024-11-01T21:16:26.289000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323289" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing maliciously crafted web content may prevent the Content Security Policy from being enforced. This issue leads to items that were banned from running to be executed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44296" }, { "category": "external", "summary": "RHBZ#2323289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44296", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44296" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced" }, { "cve": "CVE-2024-44308", "discovery_date": "2024-11-21T23:02:37.337000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2327931" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in WebKitGTK\u0027s JIT compiler. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "In order to exploit this vulnerability, the WebKitGTK JIT engine must be enabled and an attacker needs to trick a user into processing or loading malicious web content. This feature is disabled in Red Hat Enterprise Linux versions 8 and 9, meaning these releases are not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44308" }, { "category": "external", "summary": "RHBZ#2327931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327931" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44308", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44308" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-11-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nAffected installations of Red Hat Enterprise Linux 7 can disable the JIT engine by setting the JavaScriptCoreUseJIT environment variable to 0.\n\nAdditionally, in Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-11-21T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-44309", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2024-11-21T22:51:08.987000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2327927" } ], "notes": [ { "category": "description", "text": "A data isolation bypass vulnerability was discovered in WebKitGTK. Processing maliciously crafted web content could enable a cross-site scripting (XSS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: data isolation bypass vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as IMPORTANT severity due to a cookie management issue that allows an attacker to inject maliciously crafted web content, potentially leading to a cross-site scripting (XSS) attack, this flaw occurs because of improper state management during cookie handling, which could allow unauthorized script execution.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44309" }, { "category": "external", "summary": "RHBZ#2327927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44309", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44309" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44309", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44309" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-11-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-11-21T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: data isolation bypass vulnerability" }, { "cve": "CVE-2024-54467", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-03-20T12:50:18.647000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2353872" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate data cross-origin due to a cookie management issue related to improper state management.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into visiting a malicious website.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54467" }, { "category": "external", "summary": "RHBZ#2353872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54467", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54467" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54467", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54467" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0002.html", "url": "https://webkitgtk.org/security/WSA-2025-0002.html" } ], "release_date": "2025-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2024-54479", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "discovery_date": "2024-12-23T13:16:54.800976+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333841" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. In affected versions of this package, processing maliciously crafted web content may lead to an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as an Important severity because an attacker can process maliciously crafted web content, potentially leading to an unexpected process crash. This issue can disrupt the system stability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54479" }, { "category": "external", "summary": "RHBZ#2333841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54479", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54479" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54479", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54479" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121838", "url": "https://support.apple.com/en-us/121838" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:57:33.957000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54502", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-12-23T13:18:24.328627+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333843" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Webkit. Processing maliciously crafted web content may lead to an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54502" }, { "category": "external", "summary": "RHBZ#2333843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54502", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54502" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:51.903000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54505", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2024-12-23T13:18:27.108126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333844" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a type confusion issue due to improper memory handling, causing memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54505" }, { "category": "external", "summary": "RHBZ#2333844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54505", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54505" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121838", "url": "https://support.apple.com/en-us/121838" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:31.052000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2024-54508", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-12-23T13:18:30.107103+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333845" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54508" }, { "category": "external", "summary": "RHBZ#2333845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54508", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54508" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54508", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54508" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:14.487000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54534", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-12-23T13:18:32.596325+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333846" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54534" }, { "category": "external", "summary": "RHBZ#2333846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:39.974000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2024-54543", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-02-10T09:37:24.253576+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344619" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54543" }, { "category": "external", "summary": "RHBZ#2344619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54543", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2025-01-27T21:46:30.578000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2024-54551", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:23:49.963000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357909" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54551" }, { "category": "external", "summary": "RHBZ#2357909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357909" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54551", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54551" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2024-54658", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-02-11T16:12:08.426000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344946" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54658" }, { "category": "external", "summary": "RHBZ#2344946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344946" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54658", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54658" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2025-24143", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2025-02-10T09:40:08.138428+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344621" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. A maliciously crafted web page may be able to fingerprint the user due to improper access restrictions to the file system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into visiting a maliciously crafted web page.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24143" }, { "category": "external", "summary": "RHBZ#2344621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24143", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24143" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" } ], "release_date": "2025-01-27T21:46:05.639000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not visit untrusted web pages or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2025-24150", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2025-02-10T09:41:46.644580+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344622" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Copying a URL from Web Inspector may lead to command injection due to improper file handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Copying a URL from Web Inspector may lead to command injection", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into performing unlikely actions, such as enabling and opening the web inspector in an application and loading malicious web content into it. For this reason, this flaw has been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24150" }, { "category": "external", "summary": "RHBZ#2344622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24150", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24150" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24150", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24150" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" } ], "release_date": "2025-01-27T21:46:32.259000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Copying a URL from Web Inspector may lead to command injection" }, { "cve": "CVE-2025-24158", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-02-10T09:43:02.859455+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344623" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24158" }, { "category": "external", "summary": "RHBZ#2344623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24158", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122071", "url": "https://support.apple.com/en-us/122071" }, { "category": "external", "summary": "https://support.apple.com/en-us/122072", "url": "https://support.apple.com/en-us/122072" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-27T21:45:49.015000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2025-24162", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-02-10T09:44:11.167306+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344624" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper state management.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThis issue can cause an unexpected process crash. Additionally, there is no evidence of remote code execution but this possibility is not discarded.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24162" }, { "category": "external", "summary": "RHBZ#2344624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24162", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24162" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122071", "url": "https://support.apple.com/en-us/122071" }, { "category": "external", "summary": "https://support.apple.com/en-us/122072", "url": "https://support.apple.com/en-us/122072" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-27T21:45:54.015000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2025-24201", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-03-12T22:35:00.430000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2351802" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds write due to improper checks to prevent unauthorized actions, causing a break out of Web Content sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds write vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is only a risk for servers which utilize a GUI for system administration. This vulnerability can only be exploited when specific packages are used with a graphical interface to process untrusted web content, via GNOME for example.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24201" }, { "category": "external", "summary": "RHBZ#2351802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351802" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24201", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24201" }, { "category": "external", "summary": "https://support.apple.com/en-us/122281", "url": "https://support.apple.com/en-us/122281" }, { "category": "external", "summary": "https://support.apple.com/en-us/122284", "url": "https://support.apple.com/en-us/122284" }, { "category": "external", "summary": "https://support.apple.com/en-us/122285", "url": "https://support.apple.com/en-us/122285" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0002.html", "url": "https://webkitgtk.org/security/WSA-2025-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2025-03-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Systems which do not rely on a GUI for system administration (commonly referred to as \"headless\") should confirm that GNOME shell and WebKitGTK are not present on the system.\n\nWebKitGTK3 is no longer used and can therefore be uninstalled without consequence.\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nTo mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2025-03-13T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: out-of-bounds write vulnerability" }, { "cve": "CVE-2025-24208", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2025-04-07T14:26:09.363000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357910" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Loading a malicious iframe can cause a cross-site scripting attack due to permissions issues.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24208" }, { "category": "external", "summary": "RHBZ#2357910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357910" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24208", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24208" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24208", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24208" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack" }, { "cve": "CVE-2025-24209", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2025-04-07T14:27:43.092000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357911" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a buffer overflow due to improper memory handling and result in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24209" }, { "category": "external", "summary": "RHBZ#2357911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24209", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24209" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2025-24213", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2025-04-07T14:28:47.281000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357913" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper handling of floats and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A type confusion issue could lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThe x86_64 architecture is not vulnerable to this issue, the x86 architecture is not vulnerable when the SSE2 instruction set is enabled, all other architectures are vulnerable to this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24213" }, { "category": "external", "summary": "RHBZ#2357913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24213", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24213" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: A type confusion issue could lead to memory corruption" }, { "cve": "CVE-2025-24216", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:29:49.645000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357917" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24216" }, { "category": "external", "summary": "RHBZ#2357917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357917" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24216", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24216" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24216", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24216" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-24223", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:03:40.562000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366499" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24223" }, { "category": "external", "summary": "RHBZ#2366499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-24264", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:31:23.097000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357918" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24264" }, { "category": "external", "summary": "RHBZ#2357918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24264" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-30427", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-04-07T14:32:29.265000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357919" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-30427" }, { "category": "external", "summary": "RHBZ#2357919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357919" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-30427", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-30427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30427" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31204", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-05-15T13:04:43.281000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366500" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31204" }, { "category": "external", "summary": "RHBZ#2366500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-31205", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-05-15T13:05:47.441000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366501" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. A malicious website may steal data cross-origin due to improper security checks within the web browser or rendering engine, leading to unauthorized disclosure of information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into visiting a malicious website.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31205" }, { "category": "external", "summary": "RHBZ#2366501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366501" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31205", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31205" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2025-31206", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2025-05-15T13:06:54.355000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366502" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31206" }, { "category": "external", "summary": "RHBZ#2366502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31215", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2025-05-15T13:07:56.027000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366503" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31215" }, { "category": "external", "summary": "RHBZ#2366503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2025-31257", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:08:57.791000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366504" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in an unexpected crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31257" }, { "category": "external", "summary": "RHBZ#2366504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31257", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31257" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31257", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31257" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" } ] }
suse-su-2022:0182-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for webkit2gtk3", "title": "Title of the patch" }, { "category": "description", "text": "This update for webkit2gtk3 fixes the following issues:\n\n- Update to version 2.34.3 (bsc#1194019).\n- CVE-2021-30887: Fixed logic issue allowing unexpectedly unenforced Content Security Policy when processing maliciously crafted web content.\n- CVE-2021-30890: Fixed logic issue allowing universal cross site scripting when processing maliciously crafted web content.\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-182,SUSE-SLE-Module-Basesystem-15-SP3-2022-182,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-182,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-182,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-182,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-182,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-182,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-182,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-182,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-182,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-182,SUSE-Storage-7-2022-182", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0182-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0182-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220182-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0182-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" }, { "category": "self", "summary": "SUSE Bug 1194019", "url": "https://bugzilla.suse.com/1194019" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8766 page", "url": "https://www.suse.com/security/cve/CVE-2019-8766/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8782 page", "url": "https://www.suse.com/security/cve/CVE-2019-8782/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8808 page", "url": "https://www.suse.com/security/cve/CVE-2019-8808/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8815 page", "url": "https://www.suse.com/security/cve/CVE-2019-8815/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13753 page", "url": "https://www.suse.com/security/cve/CVE-2020-13753/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27918 page", "url": "https://www.suse.com/security/cve/CVE-2020-27918/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29623 page", "url": "https://www.suse.com/security/cve/CVE-2020-29623/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-3902 page", "url": "https://www.suse.com/security/cve/CVE-2020-3902/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9802 page", "url": "https://www.suse.com/security/cve/CVE-2020-9802/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9803 page", "url": "https://www.suse.com/security/cve/CVE-2020-9803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9805 page", "url": "https://www.suse.com/security/cve/CVE-2020-9805/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9947 page", "url": "https://www.suse.com/security/cve/CVE-2020-9947/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9948 page", "url": "https://www.suse.com/security/cve/CVE-2020-9948/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9951 page", "url": "https://www.suse.com/security/cve/CVE-2020-9951/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9952 page", "url": "https://www.suse.com/security/cve/CVE-2020-9952/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1765 page", "url": "https://www.suse.com/security/cve/CVE-2021-1765/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1788 page", "url": "https://www.suse.com/security/cve/CVE-2021-1788/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1817 page", "url": "https://www.suse.com/security/cve/CVE-2021-1817/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1820 page", "url": "https://www.suse.com/security/cve/CVE-2021-1820/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1825 page", "url": "https://www.suse.com/security/cve/CVE-2021-1825/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1826 page", "url": "https://www.suse.com/security/cve/CVE-2021-1826/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1844 page", "url": "https://www.suse.com/security/cve/CVE-2021-1844/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1871 page", "url": "https://www.suse.com/security/cve/CVE-2021-1871/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30661 page", "url": "https://www.suse.com/security/cve/CVE-2021-30661/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30666 page", "url": "https://www.suse.com/security/cve/CVE-2021-30666/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30682 page", "url": "https://www.suse.com/security/cve/CVE-2021-30682/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30761 page", "url": "https://www.suse.com/security/cve/CVE-2021-30761/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30762 page", "url": "https://www.suse.com/security/cve/CVE-2021-30762/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30809 page", "url": "https://www.suse.com/security/cve/CVE-2021-30809/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30818 page", "url": "https://www.suse.com/security/cve/CVE-2021-30818/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30823 page", "url": "https://www.suse.com/security/cve/CVE-2021-30823/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30836 page", "url": "https://www.suse.com/security/cve/CVE-2021-30836/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30846 page", "url": "https://www.suse.com/security/cve/CVE-2021-30846/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30848 page", "url": "https://www.suse.com/security/cve/CVE-2021-30848/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30849 page", "url": "https://www.suse.com/security/cve/CVE-2021-30849/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30851 page", "url": "https://www.suse.com/security/cve/CVE-2021-30851/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30858 page", "url": "https://www.suse.com/security/cve/CVE-2021-30858/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30884 page", "url": "https://www.suse.com/security/cve/CVE-2021-30884/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30887 page", "url": "https://www.suse.com/security/cve/CVE-2021-30887/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30888 page", "url": "https://www.suse.com/security/cve/CVE-2021-30888/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30889 page", "url": "https://www.suse.com/security/cve/CVE-2021-30889/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30890 page", "url": "https://www.suse.com/security/cve/CVE-2021-30890/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30897 page", "url": "https://www.suse.com/security/cve/CVE-2021-30897/" } ], "title": "Security update for webkit2gtk3", "tracking": { "current_release_date": "2022-01-25T17:18:51Z", "generator": { "date": "2022-01-25T17:18:51Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0182-1", "initial_release_date": "2022-01-25T17:18:51Z", "revision_history": [ { "date": "2022-01-25T17:18:51Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "product_id": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "product": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "product_id": "libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "product_id": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.34.3-23.3.aarch64", "product": { "name": "webkit-jsc-4-2.34.3-23.3.aarch64", "product_id": "webkit-jsc-4-2.34.3-23.3.aarch64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "product_id": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.34.3-23.3.aarch64", "product": { "name": "webkit2gtk3-devel-2.34.3-23.3.aarch64", "product_id": "webkit2gtk3-devel-2.34.3-23.3.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.34.3-23.3.aarch64", "product": { "name": "webkit2gtk3-minibrowser-2.34.3-23.3.aarch64", "product_id": "webkit2gtk3-minibrowser-2.34.3-23.3.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-64bit-2.34.3-23.3.aarch64_ilp32", "product": { "name": "libjavascriptcoregtk-4_0-18-64bit-2.34.3-23.3.aarch64_ilp32", "product_id": "libjavascriptcoregtk-4_0-18-64bit-2.34.3-23.3.aarch64_ilp32" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-64bit-2.34.3-23.3.aarch64_ilp32", "product": { "name": "libwebkit2gtk-4_0-37-64bit-2.34.3-23.3.aarch64_ilp32", "product_id": "libwebkit2gtk-4_0-37-64bit-2.34.3-23.3.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.i586", "product": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.i586", "product_id": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.i586" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.i586", "product": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.i586", "product_id": "libwebkit2gtk-4_0-37-2.34.3-23.3.i586" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.i586", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.i586", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.i586", "product": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.i586", "product_id": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.i586", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.i586", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.i586" } }, { "category": "product_version", "name": "webkit-jsc-4-2.34.3-23.3.i586", "product": { "name": "webkit-jsc-4-2.34.3-23.3.i586", "product_id": "webkit-jsc-4-2.34.3-23.3.i586" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.i586", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.i586", "product_id": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.i586" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.34.3-23.3.i586", "product": { "name": "webkit2gtk3-devel-2.34.3-23.3.i586", "product_id": "webkit2gtk3-devel-2.34.3-23.3.i586" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.34.3-23.3.i586", "product": { "name": "webkit2gtk3-minibrowser-2.34.3-23.3.i586", "product_id": "webkit2gtk3-minibrowser-2.34.3-23.3.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libwebkit2gtk3-lang-2.34.3-23.3.noarch", "product": { "name": "libwebkit2gtk3-lang-2.34.3-23.3.noarch", "product_id": "libwebkit2gtk3-lang-2.34.3-23.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "product": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "product_id": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "product": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "product_id": "libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "product": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "product_id": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le" } }, { "category": "product_version", "name": "webkit-jsc-4-2.34.3-23.3.ppc64le", "product": { "name": "webkit-jsc-4-2.34.3-23.3.ppc64le", "product_id": "webkit-jsc-4-2.34.3-23.3.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "product_id": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.34.3-23.3.ppc64le", "product": { "name": "webkit2gtk3-devel-2.34.3-23.3.ppc64le", "product_id": "webkit2gtk3-devel-2.34.3-23.3.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.34.3-23.3.ppc64le", "product": { "name": "webkit2gtk3-minibrowser-2.34.3-23.3.ppc64le", "product_id": "webkit2gtk3-minibrowser-2.34.3-23.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "product": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "product_id": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "product": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "product_id": "libwebkit2gtk-4_0-37-2.34.3-23.3.s390x" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "product": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "product_id": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x" } }, { "category": "product_version", "name": "webkit-jsc-4-2.34.3-23.3.s390x", "product": { "name": "webkit-jsc-4-2.34.3-23.3.s390x", "product_id": "webkit-jsc-4-2.34.3-23.3.s390x" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "product_id": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.34.3-23.3.s390x", "product": { "name": "webkit2gtk3-devel-2.34.3-23.3.s390x", "product_id": "webkit2gtk3-devel-2.34.3-23.3.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.34.3-23.3.s390x", "product": { "name": "webkit2gtk3-minibrowser-2.34.3-23.3.s390x", "product_id": "webkit2gtk3-minibrowser-2.34.3-23.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-32bit-2.34.3-23.3.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.34.3-23.3.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-32bit-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "product_id": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-32bit-2.34.3-23.3.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-32bit-2.34.3-23.3.x86_64", "product_id": "libwebkit2gtk-4_0-37-32bit-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "product_id": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.34.3-23.3.x86_64", "product": { "name": "webkit-jsc-4-2.34.3-23.3.x86_64", "product_id": "webkit-jsc-4-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "product_id": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.34.3-23.3.x86_64", "product": { "name": "webkit2gtk3-devel-2.34.3-23.3.x86_64", "product_id": "webkit2gtk3-devel-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.34.3-23.3.x86_64", "product": { "name": "webkit2gtk3-minibrowser-2.34.3-23.3.x86_64", "product_id": "webkit2gtk3-minibrowser-2.34.3-23.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-desktop-applications:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.1", "product": { "name": "SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Retail Branch Server 4.1", "product": { "name": "SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.1", "product": { "name": "SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.1" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7", "product": { "name": "SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.34.3-23.3.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.34.3-23.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.34.3-23.3.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.34.3-23.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.34.3-23.3.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.34.3-23.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.34.3-23.3.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.34.3-23.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.34.3-23.3.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.34.3-23.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.34.3-23.3.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.34.3-23.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.34.3-23.3.noarch as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.34.3-23.3.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.34.3-23.3.noarch as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.34.3-23.3.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.34.3-23.3.noarch as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.34.3-23.3.noarch", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.34.3-23.3.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.34.3-23.3.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-8766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8766" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8766", "url": "https://www.suse.com/security/cve/CVE-2019-8766" }, { "category": "external", "summary": "SUSE Bug 1156318 for CVE-2019-8766", "url": "https://bugzilla.suse.com/1156318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2019-8766" }, { "cve": "CVE-2019-8782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8782" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8782", "url": "https://www.suse.com/security/cve/CVE-2019-8782" }, { "category": "external", "summary": "SUSE Bug 1156318 for CVE-2019-8782", "url": "https://bugzilla.suse.com/1156318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2019-8782" }, { "cve": "CVE-2019-8808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8808" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8808", "url": "https://www.suse.com/security/cve/CVE-2019-8808" }, { "category": "external", "summary": "SUSE Bug 1156318 for CVE-2019-8808", "url": "https://bugzilla.suse.com/1156318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2019-8808" }, { "cve": "CVE-2019-8815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8815" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8815", "url": "https://www.suse.com/security/cve/CVE-2019-8815" }, { "category": "external", "summary": "SUSE Bug 1156318 for CVE-2019-8815", "url": "https://bugzilla.suse.com/1156318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2019-8815" }, { "cve": "CVE-2020-13753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13753" } ], "notes": [ { "category": "general", "text": "The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal\u0027s input buffer, similar to CVE-2017-5226.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13753", "url": "https://www.suse.com/security/cve/CVE-2020-13753" }, { "category": "external", "summary": "SUSE Bug 1173998 for CVE-2020-13753", "url": "https://bugzilla.suse.com/1173998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2020-13753" }, { "cve": "CVE-2020-27918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27918" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, Safari 14.0.1, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27918", "url": "https://www.suse.com/security/cve/CVE-2020-27918" }, { "category": "external", "summary": "SUSE Bug 1184262 for CVE-2020-27918", "url": "https://bugzilla.suse.com/1184262" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2020-27918" }, { "cve": "CVE-2020-29623", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29623" } ], "notes": [ { "category": "general", "text": "\"Clear History and Website Data\" did not clear the history. The issue was addressed with improved data deletion. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. A user may be unable to fully delete browsing history.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29623", "url": "https://www.suse.com/security/cve/CVE-2020-29623" }, { "category": "external", "summary": "SUSE Bug 1184262 for CVE-2020-29623", "url": "https://bugzilla.suse.com/1184262" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2020-29623" }, { "cve": "CVE-2020-3902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-3902" } ], "notes": [ { "category": "general", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-3902", "url": "https://www.suse.com/security/cve/CVE-2020-3902" }, { "category": "external", "summary": "SUSE Bug 1170643 for CVE-2020-3902", "url": "https://bugzilla.suse.com/1170643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2020-3902" }, { "cve": "CVE-2020-9802", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9802" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9802", "url": "https://www.suse.com/security/cve/CVE-2020-9802" }, { "category": "external", "summary": "SUSE Bug 1173998 for CVE-2020-9802", "url": "https://bugzilla.suse.com/1173998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2020-9802" }, { "cve": "CVE-2020-9803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9803" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9803", "url": "https://www.suse.com/security/cve/CVE-2020-9803" }, { "category": "external", "summary": "SUSE Bug 1173998 for CVE-2020-9803", "url": "https://bugzilla.suse.com/1173998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "moderate" } ], "title": "CVE-2020-9803" }, { "cve": "CVE-2020-9805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9805" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9805", "url": "https://www.suse.com/security/cve/CVE-2020-9805" }, { "category": "external", "summary": "SUSE Bug 1173998 for CVE-2020-9805", "url": "https://bugzilla.suse.com/1173998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2020-9805" }, { "cve": "CVE-2020-9947", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9947" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 7.0, iOS 14.0 and iPadOS 14.0, iTunes for Windows 12.10.9, iCloud for Windows 11.5, tvOS 14.0, Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9947", "url": "https://www.suse.com/security/cve/CVE-2020-9947" }, { "category": "external", "summary": "SUSE Bug 1184262 for CVE-2020-9947", "url": "https://bugzilla.suse.com/1184262" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2020-9947" }, { "cve": "CVE-2020-9948", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9948" } ], "notes": [ { "category": "general", "text": "A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9948", "url": "https://www.suse.com/security/cve/CVE-2020-9948" }, { "category": "external", "summary": "SUSE Bug 1179122 for CVE-2020-9948", "url": "https://bugzilla.suse.com/1179122" }, { "category": "external", "summary": "SUSE Bug 1179910 for CVE-2020-9948", "url": "https://bugzilla.suse.com/1179910" }, { "category": "external", "summary": "SUSE Bug 1179911 for CVE-2020-9948", "url": "https://bugzilla.suse.com/1179911" }, { "category": "external", "summary": "SUSE Bug 1179912 for CVE-2020-9948", "url": "https://bugzilla.suse.com/1179912" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2020-9948" }, { "cve": "CVE-2020-9951", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9951" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9951", "url": "https://www.suse.com/security/cve/CVE-2020-9951" }, { "category": "external", "summary": "SUSE Bug 1179122 for CVE-2020-9951", "url": "https://bugzilla.suse.com/1179122" }, { "category": "external", "summary": "SUSE Bug 1179910 for CVE-2020-9951", "url": "https://bugzilla.suse.com/1179910" }, { "category": "external", "summary": "SUSE Bug 1179911 for CVE-2020-9951", "url": "https://bugzilla.suse.com/1179911" }, { "category": "external", "summary": "SUSE Bug 1179912 for CVE-2020-9951", "url": "https://bugzilla.suse.com/1179912" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2020-9951" }, { "cve": "CVE-2020-9952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9952" } ], "notes": [ { "category": "general", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9952", "url": "https://www.suse.com/security/cve/CVE-2020-9952" }, { "category": "external", "summary": "SUSE Bug 1179122 for CVE-2020-9952", "url": "https://bugzilla.suse.com/1179122" }, { "category": "external", "summary": "SUSE Bug 1179910 for CVE-2020-9952", "url": "https://bugzilla.suse.com/1179910" }, { "category": "external", "summary": "SUSE Bug 1179911 for CVE-2020-9952", "url": "https://bugzilla.suse.com/1179911" }, { "category": "external", "summary": "SUSE Bug 1179912 for CVE-2020-9952", "url": "https://bugzilla.suse.com/1179912" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2020-9952" }, { "cve": "CVE-2021-1765", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1765" } ], "notes": [ { "category": "general", "text": "This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Maliciously crafted web content may violate iframe sandboxing policy.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1765", "url": "https://www.suse.com/security/cve/CVE-2021-1765" }, { "category": "external", "summary": "SUSE Bug 1184262 for CVE-2021-1765", "url": "https://bugzilla.suse.com/1184262" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "critical" } ], "title": "CVE-2021-1765" }, { "cve": "CVE-2021-1788", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1788" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1788", "url": "https://www.suse.com/security/cve/CVE-2021-1788" }, { "category": "external", "summary": "SUSE Bug 1184155 for CVE-2021-1788", "url": "https://bugzilla.suse.com/1184155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "critical" } ], "title": "CVE-2021-1788" }, { "cve": "CVE-2021-1817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1817" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1817", "url": "https://www.suse.com/security/cve/CVE-2021-1817" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-1817", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-1817" }, { "cve": "CVE-2021-1820", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1820" } ], "notes": [ { "category": "general", "text": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may result in the disclosure of process memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1820", "url": "https://www.suse.com/security/cve/CVE-2021-1820" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-1820", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-1820" }, { "cve": "CVE-2021-1825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1825" } ], "notes": [ { "category": "general", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iTunes 12.11.3 for Windows, iCloud for Windows 12.3, macOS Big Sur 11.3, Safari 14.1, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1825", "url": "https://www.suse.com/security/cve/CVE-2021-1825" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-1825", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-1825" }, { "cve": "CVE-2021-1826", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1826" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1826", "url": "https://www.suse.com/security/cve/CVE-2021-1826" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-1826", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-1826" }, { "cve": "CVE-2021-1844", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1844" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 14.4.1 and iPadOS 14.4.1, Safari 14.0.3 (v. 14610.4.3.1.7 and 15610.4.3.1.7), watchOS 7.3.2, macOS Big Sur 11.2.3. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1844", "url": "https://www.suse.com/security/cve/CVE-2021-1844" }, { "category": "external", "summary": "SUSE Bug 1184155 for CVE-2021-1844", "url": "https://bugzilla.suse.com/1184155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "critical" } ], "title": "CVE-2021-1844" }, { "cve": "CVE-2021-1871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1871" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1871", "url": "https://www.suse.com/security/cve/CVE-2021-1871" }, { "category": "external", "summary": "SUSE Bug 1184155 for CVE-2021-1871", "url": "https://bugzilla.suse.com/1184155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "critical" } ], "title": "CVE-2021-1871" }, { "cve": "CVE-2021-30661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30661" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.1, iOS 12.5.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30661", "url": "https://www.suse.com/security/cve/CVE-2021-30661" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-30661", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30661" }, { "cve": "CVE-2021-30666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30666" } ], "notes": [ { "category": "general", "text": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30666", "url": "https://www.suse.com/security/cve/CVE-2021-30666" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-30666", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30666" }, { "cve": "CVE-2021-30682", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30682" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30682", "url": "https://www.suse.com/security/cve/CVE-2021-30682" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-30682", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30682" }, { "cve": "CVE-2021-30761", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30761" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30761", "url": "https://www.suse.com/security/cve/CVE-2021-30761" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-30761", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30761" }, { "cve": "CVE-2021-30762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30762" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30762", "url": "https://www.suse.com/security/cve/CVE-2021-30762" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-30762", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30762" }, { "cve": "CVE-2021-30809", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30809" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30809", "url": "https://www.suse.com/security/cve/CVE-2021-30809" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30809", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30809" }, { "cve": "CVE-2021-30818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30818" } ], "notes": [ { "category": "general", "text": "A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, tvOS 15, iOS 15 and iPadOS 15, Safari 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30818", "url": "https://www.suse.com/security/cve/CVE-2021-30818" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30818", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30818" }, { "cve": "CVE-2021-30823", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30823" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.0.1, iOS 14.8 and iPadOS 14.8, tvOS 15, Safari 15, watchOS 8. An attacker in a privileged network position may be able to bypass HSTS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30823", "url": "https://www.suse.com/security/cve/CVE-2021-30823" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30823", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30823" }, { "cve": "CVE-2021-30836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30836" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.8 and iPadOS 14.8, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing a maliciously crafted audio file may disclose restricted memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30836", "url": "https://www.suse.com/security/cve/CVE-2021-30836" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30836", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30836" }, { "cve": "CVE-2021-30846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30846" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30846", "url": "https://www.suse.com/security/cve/CVE-2021-30846" }, { "category": "external", "summary": "SUSE Bug 1192063 for CVE-2021-30846", "url": "https://bugzilla.suse.com/1192063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30846" }, { "cve": "CVE-2021-30848", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30848" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30848", "url": "https://www.suse.com/security/cve/CVE-2021-30848" }, { "category": "external", "summary": "SUSE Bug 1192063 for CVE-2021-30848", "url": "https://bugzilla.suse.com/1192063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30848" }, { "cve": "CVE-2021-30849", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30849" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30849", "url": "https://www.suse.com/security/cve/CVE-2021-30849" }, { "category": "external", "summary": "SUSE Bug 1192063 for CVE-2021-30849", "url": "https://bugzilla.suse.com/1192063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30849" }, { "cve": "CVE-2021-30851", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30851" } ], "notes": [ { "category": "general", "text": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30851", "url": "https://www.suse.com/security/cve/CVE-2021-30851" }, { "category": "external", "summary": "SUSE Bug 1192063 for CVE-2021-30851", "url": "https://bugzilla.suse.com/1192063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30851" }, { "cve": "CVE-2021-30858", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30858" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30858", "url": "https://www.suse.com/security/cve/CVE-2021-30858" }, { "category": "external", "summary": "SUSE Bug 1190701 for CVE-2021-30858", "url": "https://bugzilla.suse.com/1190701" }, { "category": "external", "summary": "SUSE Bug 1191298 for CVE-2021-30858", "url": "https://bugzilla.suse.com/1191298" }, { "category": "external", "summary": "SUSE Bug 1191301 for CVE-2021-30858", "url": "https://bugzilla.suse.com/1191301" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30858" }, { "cve": "CVE-2021-30884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30884" } ], "notes": [ { "category": "general", "text": "The issue was resolved with additional restrictions on CSS compositing. This issue is fixed in tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Visiting a maliciously crafted website may reveal a user\u0027s browsing history.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30884", "url": "https://www.suse.com/security/cve/CVE-2021-30884" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30884", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30884" }, { "cve": "CVE-2021-30887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30887" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to unexpectedly unenforced Content Security Policy.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30887", "url": "https://www.suse.com/security/cve/CVE-2021-30887" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30887", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30887" }, { "cve": "CVE-2021-30888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30888" } ], "notes": [ { "category": "general", "text": "An information leakage issue was addressed. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1. A malicious website using Content Security Policy reports may be able to leak information via redirect behavior .", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30888", "url": "https://www.suse.com/security/cve/CVE-2021-30888" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30888", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30888" }, { "cve": "CVE-2021-30889", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30889" } ], "notes": [ { "category": "general", "text": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30889", "url": "https://www.suse.com/security/cve/CVE-2021-30889" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30889", "url": "https://bugzilla.suse.com/1194019" }, { "category": "external", "summary": "SUSE Bug 1194135 for CVE-2021-30889", "url": "https://bugzilla.suse.com/1194135" }, { "category": "external", "summary": "SUSE Bug 1194138 for CVE-2021-30889", "url": "https://bugzilla.suse.com/1194138" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30889" }, { "cve": "CVE-2021-30890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30890" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30890", "url": "https://www.suse.com/security/cve/CVE-2021-30890" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30890", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30890" }, { "cve": "CVE-2021-30897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30897" } ], "notes": [ { "category": "general", "text": "An issue existed in the specification for the resource timing API. The specification was updated and the updated specification was implemented. This issue is fixed in macOS Monterey 12.0.1. A malicious website may exfiltrate data cross-origin.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30897", "url": "https://www.suse.com/security/cve/CVE-2021-30897" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30897", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Enterprise Storage 7:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Proxy 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Proxy 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Retail Branch Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.ppc64le", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.s390x", "SUSE Manager Server 4.1:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T17:18:51Z", "details": "important" } ], "title": "CVE-2021-30897" } ] }
suse-su-2022:0182-2
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for webkit2gtk3", "title": "Title of the patch" }, { "category": "description", "text": "This update for webkit2gtk3 fixes the following issues:\n\n- Update to version 2.34.3 (bsc#1194019).\n- CVE-2021-30887: Fixed logic issue allowing unexpectedly unenforced Content Security Policy when processing maliciously crafted web content.\n- CVE-2021-30890: Fixed logic issue allowing universal cross site scripting when processing maliciously crafted web content.\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-182,SUSE-SLE-Product-RT-15-SP2-2022-182", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0182-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0182-2", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220182-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0182-2", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" }, { "category": "self", "summary": "SUSE Bug 1194019", "url": "https://bugzilla.suse.com/1194019" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8766 page", "url": "https://www.suse.com/security/cve/CVE-2019-8766/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8782 page", "url": "https://www.suse.com/security/cve/CVE-2019-8782/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8808 page", "url": "https://www.suse.com/security/cve/CVE-2019-8808/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8815 page", "url": "https://www.suse.com/security/cve/CVE-2019-8815/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13753 page", "url": "https://www.suse.com/security/cve/CVE-2020-13753/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27918 page", "url": "https://www.suse.com/security/cve/CVE-2020-27918/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29623 page", "url": "https://www.suse.com/security/cve/CVE-2020-29623/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-3902 page", "url": "https://www.suse.com/security/cve/CVE-2020-3902/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9802 page", "url": "https://www.suse.com/security/cve/CVE-2020-9802/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9803 page", "url": "https://www.suse.com/security/cve/CVE-2020-9803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9805 page", "url": "https://www.suse.com/security/cve/CVE-2020-9805/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9947 page", "url": "https://www.suse.com/security/cve/CVE-2020-9947/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9948 page", "url": "https://www.suse.com/security/cve/CVE-2020-9948/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9951 page", "url": "https://www.suse.com/security/cve/CVE-2020-9951/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9952 page", "url": "https://www.suse.com/security/cve/CVE-2020-9952/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1765 page", "url": "https://www.suse.com/security/cve/CVE-2021-1765/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1788 page", "url": "https://www.suse.com/security/cve/CVE-2021-1788/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1817 page", "url": "https://www.suse.com/security/cve/CVE-2021-1817/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1820 page", "url": "https://www.suse.com/security/cve/CVE-2021-1820/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1825 page", "url": "https://www.suse.com/security/cve/CVE-2021-1825/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1826 page", "url": "https://www.suse.com/security/cve/CVE-2021-1826/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1844 page", "url": "https://www.suse.com/security/cve/CVE-2021-1844/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1871 page", "url": "https://www.suse.com/security/cve/CVE-2021-1871/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30661 page", "url": "https://www.suse.com/security/cve/CVE-2021-30661/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30666 page", "url": "https://www.suse.com/security/cve/CVE-2021-30666/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30682 page", "url": "https://www.suse.com/security/cve/CVE-2021-30682/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30761 page", "url": "https://www.suse.com/security/cve/CVE-2021-30761/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30762 page", "url": "https://www.suse.com/security/cve/CVE-2021-30762/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30809 page", "url": "https://www.suse.com/security/cve/CVE-2021-30809/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30818 page", "url": "https://www.suse.com/security/cve/CVE-2021-30818/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30823 page", "url": "https://www.suse.com/security/cve/CVE-2021-30823/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30836 page", "url": "https://www.suse.com/security/cve/CVE-2021-30836/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30846 page", "url": "https://www.suse.com/security/cve/CVE-2021-30846/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30848 page", "url": "https://www.suse.com/security/cve/CVE-2021-30848/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30849 page", "url": "https://www.suse.com/security/cve/CVE-2021-30849/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30851 page", "url": "https://www.suse.com/security/cve/CVE-2021-30851/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30858 page", "url": "https://www.suse.com/security/cve/CVE-2021-30858/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30884 page", "url": "https://www.suse.com/security/cve/CVE-2021-30884/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30887 page", "url": "https://www.suse.com/security/cve/CVE-2021-30887/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30888 page", "url": "https://www.suse.com/security/cve/CVE-2021-30888/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30889 page", "url": "https://www.suse.com/security/cve/CVE-2021-30889/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30890 page", "url": "https://www.suse.com/security/cve/CVE-2021-30890/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-30897 page", "url": "https://www.suse.com/security/cve/CVE-2021-30897/" } ], "title": "Security update for webkit2gtk3", "tracking": { "current_release_date": "2022-02-17T07:36:59Z", "generator": { "date": "2022-02-17T07:36:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0182-2", "initial_release_date": "2022-02-17T07:36:59Z", "revision_history": [ { "date": "2022-02-17T07:36:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64", "product_id": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.aarch64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "product": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64", "product_id": "libwebkit2gtk-4_0-37-2.34.3-23.3.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64", "product_id": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.aarch64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.34.3-23.3.aarch64", "product": { "name": "webkit-jsc-4-2.34.3-23.3.aarch64", "product_id": "webkit-jsc-4-2.34.3-23.3.aarch64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64", "product_id": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.34.3-23.3.aarch64", "product": { "name": "webkit2gtk3-devel-2.34.3-23.3.aarch64", "product_id": "webkit2gtk3-devel-2.34.3-23.3.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.34.3-23.3.aarch64", "product": { "name": "webkit2gtk3-minibrowser-2.34.3-23.3.aarch64", "product_id": "webkit2gtk3-minibrowser-2.34.3-23.3.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-64bit-2.34.3-23.3.aarch64_ilp32", "product": { "name": "libjavascriptcoregtk-4_0-18-64bit-2.34.3-23.3.aarch64_ilp32", "product_id": "libjavascriptcoregtk-4_0-18-64bit-2.34.3-23.3.aarch64_ilp32" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-64bit-2.34.3-23.3.aarch64_ilp32", "product": { "name": "libwebkit2gtk-4_0-37-64bit-2.34.3-23.3.aarch64_ilp32", "product_id": "libwebkit2gtk-4_0-37-64bit-2.34.3-23.3.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.i586", "product": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.i586", "product_id": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.i586" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.i586", "product": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.i586", "product_id": "libwebkit2gtk-4_0-37-2.34.3-23.3.i586" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.i586", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.i586", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.i586", "product": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.i586", "product_id": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.i586", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.i586", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.i586" } }, { "category": "product_version", "name": "webkit-jsc-4-2.34.3-23.3.i586", "product": { "name": "webkit-jsc-4-2.34.3-23.3.i586", "product_id": "webkit-jsc-4-2.34.3-23.3.i586" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.i586", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.i586", "product_id": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.i586" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.34.3-23.3.i586", "product": { "name": "webkit2gtk3-devel-2.34.3-23.3.i586", "product_id": "webkit2gtk3-devel-2.34.3-23.3.i586" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.34.3-23.3.i586", "product": { "name": "webkit2gtk3-minibrowser-2.34.3-23.3.i586", "product_id": "webkit2gtk3-minibrowser-2.34.3-23.3.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libwebkit2gtk3-lang-2.34.3-23.3.noarch", "product": { "name": "libwebkit2gtk3-lang-2.34.3-23.3.noarch", "product_id": "libwebkit2gtk3-lang-2.34.3-23.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "product": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le", "product_id": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.ppc64le" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "product": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le", "product_id": "libwebkit2gtk-4_0-37-2.34.3-23.3.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "product": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le", "product_id": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.ppc64le" } }, { "category": "product_version", "name": "webkit-jsc-4-2.34.3-23.3.ppc64le", "product": { "name": "webkit-jsc-4-2.34.3-23.3.ppc64le", "product_id": "webkit-jsc-4-2.34.3-23.3.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le", "product_id": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.34.3-23.3.ppc64le", "product": { "name": "webkit2gtk3-devel-2.34.3-23.3.ppc64le", "product_id": "webkit2gtk3-devel-2.34.3-23.3.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.34.3-23.3.ppc64le", "product": { "name": "webkit2gtk3-minibrowser-2.34.3-23.3.ppc64le", "product_id": "webkit2gtk3-minibrowser-2.34.3-23.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "product": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x", "product_id": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.s390x" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "product": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.s390x", "product_id": "libwebkit2gtk-4_0-37-2.34.3-23.3.s390x" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "product": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x", "product_id": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.s390x" } }, { "category": "product_version", "name": "webkit-jsc-4-2.34.3-23.3.s390x", "product": { "name": "webkit-jsc-4-2.34.3-23.3.s390x", "product_id": "webkit-jsc-4-2.34.3-23.3.s390x" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x", "product_id": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.34.3-23.3.s390x", "product": { "name": "webkit2gtk3-devel-2.34.3-23.3.s390x", "product_id": "webkit2gtk3-devel-2.34.3-23.3.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.34.3-23.3.s390x", "product": { "name": "webkit2gtk3-minibrowser-2.34.3-23.3.s390x", "product_id": "webkit2gtk3-minibrowser-2.34.3-23.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-32bit-2.34.3-23.3.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.34.3-23.3.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-32bit-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "product_id": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-32bit-2.34.3-23.3.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-32bit-2.34.3-23.3.x86_64", "product_id": "libwebkit2gtk-4_0-37-32bit-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "product_id": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.34.3-23.3.x86_64", "product": { "name": "webkit-jsc-4-2.34.3-23.3.x86_64", "product_id": "webkit-jsc-4-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "product_id": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.34.3-23.3.x86_64", "product": { "name": "webkit2gtk3-devel-2.34.3-23.3.x86_64", "product_id": "webkit2gtk3-devel-2.34.3-23.3.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.34.3-23.3.x86_64", "product": { "name": "webkit2gtk3-minibrowser-2.34.3-23.3.x86_64", "product_id": "webkit2gtk3-minibrowser-2.34.3-23.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 15 SP2", "product": { "name": "SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_rt:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.34.3-23.3.noarch as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.34.3-23.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.34.3-23.3.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" }, "product_reference": "webkit2gtk3-devel-2.34.3-23.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-8766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8766" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8766", "url": "https://www.suse.com/security/cve/CVE-2019-8766" }, { "category": "external", "summary": "SUSE Bug 1156318 for CVE-2019-8766", "url": "https://bugzilla.suse.com/1156318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2019-8766" }, { "cve": "CVE-2019-8782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8782" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8782", "url": "https://www.suse.com/security/cve/CVE-2019-8782" }, { "category": "external", "summary": "SUSE Bug 1156318 for CVE-2019-8782", "url": "https://bugzilla.suse.com/1156318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2019-8782" }, { "cve": "CVE-2019-8808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8808" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8808", "url": "https://www.suse.com/security/cve/CVE-2019-8808" }, { "category": "external", "summary": "SUSE Bug 1156318 for CVE-2019-8808", "url": "https://bugzilla.suse.com/1156318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2019-8808" }, { "cve": "CVE-2019-8815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8815" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8815", "url": "https://www.suse.com/security/cve/CVE-2019-8815" }, { "category": "external", "summary": "SUSE Bug 1156318 for CVE-2019-8815", "url": "https://bugzilla.suse.com/1156318" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2019-8815" }, { "cve": "CVE-2020-13753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13753" } ], "notes": [ { "category": "general", "text": "The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal\u0027s input buffer, similar to CVE-2017-5226.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13753", "url": "https://www.suse.com/security/cve/CVE-2020-13753" }, { "category": "external", "summary": "SUSE Bug 1173998 for CVE-2020-13753", "url": "https://bugzilla.suse.com/1173998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2020-13753" }, { "cve": "CVE-2020-27918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27918" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, Safari 14.0.1, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27918", "url": "https://www.suse.com/security/cve/CVE-2020-27918" }, { "category": "external", "summary": "SUSE Bug 1184262 for CVE-2020-27918", "url": "https://bugzilla.suse.com/1184262" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2020-27918" }, { "cve": "CVE-2020-29623", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29623" } ], "notes": [ { "category": "general", "text": "\"Clear History and Website Data\" did not clear the history. The issue was addressed with improved data deletion. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. A user may be unable to fully delete browsing history.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29623", "url": "https://www.suse.com/security/cve/CVE-2020-29623" }, { "category": "external", "summary": "SUSE Bug 1184262 for CVE-2020-29623", "url": "https://bugzilla.suse.com/1184262" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2020-29623" }, { "cve": "CVE-2020-3902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-3902" } ], "notes": [ { "category": "general", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-3902", "url": "https://www.suse.com/security/cve/CVE-2020-3902" }, { "category": "external", "summary": "SUSE Bug 1170643 for CVE-2020-3902", "url": "https://bugzilla.suse.com/1170643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2020-3902" }, { "cve": "CVE-2020-9802", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9802" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9802", "url": "https://www.suse.com/security/cve/CVE-2020-9802" }, { "category": "external", "summary": "SUSE Bug 1173998 for CVE-2020-9802", "url": "https://bugzilla.suse.com/1173998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2020-9802" }, { "cve": "CVE-2020-9803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9803" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9803", "url": "https://www.suse.com/security/cve/CVE-2020-9803" }, { "category": "external", "summary": "SUSE Bug 1173998 for CVE-2020-9803", "url": "https://bugzilla.suse.com/1173998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "moderate" } ], "title": "CVE-2020-9803" }, { "cve": "CVE-2020-9805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9805" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9805", "url": "https://www.suse.com/security/cve/CVE-2020-9805" }, { "category": "external", "summary": "SUSE Bug 1173998 for CVE-2020-9805", "url": "https://bugzilla.suse.com/1173998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2020-9805" }, { "cve": "CVE-2020-9947", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9947" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 7.0, iOS 14.0 and iPadOS 14.0, iTunes for Windows 12.10.9, iCloud for Windows 11.5, tvOS 14.0, Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9947", "url": "https://www.suse.com/security/cve/CVE-2020-9947" }, { "category": "external", "summary": "SUSE Bug 1184262 for CVE-2020-9947", "url": "https://bugzilla.suse.com/1184262" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2020-9947" }, { "cve": "CVE-2020-9948", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9948" } ], "notes": [ { "category": "general", "text": "A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9948", "url": "https://www.suse.com/security/cve/CVE-2020-9948" }, { "category": "external", "summary": "SUSE Bug 1179122 for CVE-2020-9948", "url": "https://bugzilla.suse.com/1179122" }, { "category": "external", "summary": "SUSE Bug 1179910 for CVE-2020-9948", "url": "https://bugzilla.suse.com/1179910" }, { "category": "external", "summary": "SUSE Bug 1179911 for CVE-2020-9948", "url": "https://bugzilla.suse.com/1179911" }, { "category": "external", "summary": "SUSE Bug 1179912 for CVE-2020-9948", "url": "https://bugzilla.suse.com/1179912" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2020-9948" }, { "cve": "CVE-2020-9951", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9951" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9951", "url": "https://www.suse.com/security/cve/CVE-2020-9951" }, { "category": "external", "summary": "SUSE Bug 1179122 for CVE-2020-9951", "url": "https://bugzilla.suse.com/1179122" }, { "category": "external", "summary": "SUSE Bug 1179910 for CVE-2020-9951", "url": "https://bugzilla.suse.com/1179910" }, { "category": "external", "summary": "SUSE Bug 1179911 for CVE-2020-9951", "url": "https://bugzilla.suse.com/1179911" }, { "category": "external", "summary": "SUSE Bug 1179912 for CVE-2020-9951", "url": "https://bugzilla.suse.com/1179912" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2020-9951" }, { "cve": "CVE-2020-9952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-9952" } ], "notes": [ { "category": "general", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-9952", "url": "https://www.suse.com/security/cve/CVE-2020-9952" }, { "category": "external", "summary": "SUSE Bug 1179122 for CVE-2020-9952", "url": "https://bugzilla.suse.com/1179122" }, { "category": "external", "summary": "SUSE Bug 1179910 for CVE-2020-9952", "url": "https://bugzilla.suse.com/1179910" }, { "category": "external", "summary": "SUSE Bug 1179911 for CVE-2020-9952", "url": "https://bugzilla.suse.com/1179911" }, { "category": "external", "summary": "SUSE Bug 1179912 for CVE-2020-9952", "url": "https://bugzilla.suse.com/1179912" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2020-9952" }, { "cve": "CVE-2021-1765", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1765" } ], "notes": [ { "category": "general", "text": "This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Maliciously crafted web content may violate iframe sandboxing policy.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1765", "url": "https://www.suse.com/security/cve/CVE-2021-1765" }, { "category": "external", "summary": "SUSE Bug 1184262 for CVE-2021-1765", "url": "https://bugzilla.suse.com/1184262" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "critical" } ], "title": "CVE-2021-1765" }, { "cve": "CVE-2021-1788", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1788" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1788", "url": "https://www.suse.com/security/cve/CVE-2021-1788" }, { "category": "external", "summary": "SUSE Bug 1184155 for CVE-2021-1788", "url": "https://bugzilla.suse.com/1184155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "critical" } ], "title": "CVE-2021-1788" }, { "cve": "CVE-2021-1817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1817" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1817", "url": "https://www.suse.com/security/cve/CVE-2021-1817" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-1817", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-1817" }, { "cve": "CVE-2021-1820", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1820" } ], "notes": [ { "category": "general", "text": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may result in the disclosure of process memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1820", "url": "https://www.suse.com/security/cve/CVE-2021-1820" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-1820", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-1820" }, { "cve": "CVE-2021-1825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1825" } ], "notes": [ { "category": "general", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iTunes 12.11.3 for Windows, iCloud for Windows 12.3, macOS Big Sur 11.3, Safari 14.1, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1825", "url": "https://www.suse.com/security/cve/CVE-2021-1825" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-1825", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-1825" }, { "cve": "CVE-2021-1826", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1826" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1826", "url": "https://www.suse.com/security/cve/CVE-2021-1826" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-1826", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-1826" }, { "cve": "CVE-2021-1844", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1844" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 14.4.1 and iPadOS 14.4.1, Safari 14.0.3 (v. 14610.4.3.1.7 and 15610.4.3.1.7), watchOS 7.3.2, macOS Big Sur 11.2.3. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1844", "url": "https://www.suse.com/security/cve/CVE-2021-1844" }, { "category": "external", "summary": "SUSE Bug 1184155 for CVE-2021-1844", "url": "https://bugzilla.suse.com/1184155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "critical" } ], "title": "CVE-2021-1844" }, { "cve": "CVE-2021-1871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-1871" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-1871", "url": "https://www.suse.com/security/cve/CVE-2021-1871" }, { "category": "external", "summary": "SUSE Bug 1184155 for CVE-2021-1871", "url": "https://bugzilla.suse.com/1184155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "critical" } ], "title": "CVE-2021-1871" }, { "cve": "CVE-2021-30661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30661" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.1, iOS 12.5.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30661", "url": "https://www.suse.com/security/cve/CVE-2021-30661" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-30661", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30661" }, { "cve": "CVE-2021-30666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30666" } ], "notes": [ { "category": "general", "text": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30666", "url": "https://www.suse.com/security/cve/CVE-2021-30666" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-30666", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30666" }, { "cve": "CVE-2021-30682", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30682" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30682", "url": "https://www.suse.com/security/cve/CVE-2021-30682" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-30682", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30682" }, { "cve": "CVE-2021-30761", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30761" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30761", "url": "https://www.suse.com/security/cve/CVE-2021-30761" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-30761", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30761" }, { "cve": "CVE-2021-30762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30762" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30762", "url": "https://www.suse.com/security/cve/CVE-2021-30762" }, { "category": "external", "summary": "SUSE Bug 1188697 for CVE-2021-30762", "url": "https://bugzilla.suse.com/1188697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30762" }, { "cve": "CVE-2021-30809", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30809" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30809", "url": "https://www.suse.com/security/cve/CVE-2021-30809" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30809", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30809" }, { "cve": "CVE-2021-30818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30818" } ], "notes": [ { "category": "general", "text": "A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, tvOS 15, iOS 15 and iPadOS 15, Safari 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30818", "url": "https://www.suse.com/security/cve/CVE-2021-30818" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30818", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30818" }, { "cve": "CVE-2021-30823", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30823" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.0.1, iOS 14.8 and iPadOS 14.8, tvOS 15, Safari 15, watchOS 8. An attacker in a privileged network position may be able to bypass HSTS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30823", "url": "https://www.suse.com/security/cve/CVE-2021-30823" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30823", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30823" }, { "cve": "CVE-2021-30836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30836" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.8 and iPadOS 14.8, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing a maliciously crafted audio file may disclose restricted memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30836", "url": "https://www.suse.com/security/cve/CVE-2021-30836" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30836", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30836" }, { "cve": "CVE-2021-30846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30846" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30846", "url": "https://www.suse.com/security/cve/CVE-2021-30846" }, { "category": "external", "summary": "SUSE Bug 1192063 for CVE-2021-30846", "url": "https://bugzilla.suse.com/1192063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30846" }, { "cve": "CVE-2021-30848", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30848" } ], "notes": [ { "category": "general", "text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30848", "url": "https://www.suse.com/security/cve/CVE-2021-30848" }, { "category": "external", "summary": "SUSE Bug 1192063 for CVE-2021-30848", "url": "https://bugzilla.suse.com/1192063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30848" }, { "cve": "CVE-2021-30849", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30849" } ], "notes": [ { "category": "general", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30849", "url": "https://www.suse.com/security/cve/CVE-2021-30849" }, { "category": "external", "summary": "SUSE Bug 1192063 for CVE-2021-30849", "url": "https://bugzilla.suse.com/1192063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30849" }, { "cve": "CVE-2021-30851", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30851" } ], "notes": [ { "category": "general", "text": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30851", "url": "https://www.suse.com/security/cve/CVE-2021-30851" }, { "category": "external", "summary": "SUSE Bug 1192063 for CVE-2021-30851", "url": "https://bugzilla.suse.com/1192063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30851" }, { "cve": "CVE-2021-30858", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30858" } ], "notes": [ { "category": "general", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30858", "url": "https://www.suse.com/security/cve/CVE-2021-30858" }, { "category": "external", "summary": "SUSE Bug 1190701 for CVE-2021-30858", "url": "https://bugzilla.suse.com/1190701" }, { "category": "external", "summary": "SUSE Bug 1191298 for CVE-2021-30858", "url": "https://bugzilla.suse.com/1191298" }, { "category": "external", "summary": "SUSE Bug 1191301 for CVE-2021-30858", "url": "https://bugzilla.suse.com/1191301" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30858" }, { "cve": "CVE-2021-30884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30884" } ], "notes": [ { "category": "general", "text": "The issue was resolved with additional restrictions on CSS compositing. This issue is fixed in tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Visiting a maliciously crafted website may reveal a user\u0027s browsing history.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30884", "url": "https://www.suse.com/security/cve/CVE-2021-30884" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30884", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30884" }, { "cve": "CVE-2021-30887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30887" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to unexpectedly unenforced Content Security Policy.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30887", "url": "https://www.suse.com/security/cve/CVE-2021-30887" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30887", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30887" }, { "cve": "CVE-2021-30888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30888" } ], "notes": [ { "category": "general", "text": "An information leakage issue was addressed. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1. A malicious website using Content Security Policy reports may be able to leak information via redirect behavior .", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30888", "url": "https://www.suse.com/security/cve/CVE-2021-30888" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30888", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30888" }, { "cve": "CVE-2021-30889", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30889" } ], "notes": [ { "category": "general", "text": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30889", "url": "https://www.suse.com/security/cve/CVE-2021-30889" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30889", "url": "https://bugzilla.suse.com/1194019" }, { "category": "external", "summary": "SUSE Bug 1194135 for CVE-2021-30889", "url": "https://bugzilla.suse.com/1194135" }, { "category": "external", "summary": "SUSE Bug 1194138 for CVE-2021-30889", "url": "https://bugzilla.suse.com/1194138" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30889" }, { "cve": "CVE-2021-30890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30890" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30890", "url": "https://www.suse.com/security/cve/CVE-2021-30890" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30890", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30890" }, { "cve": "CVE-2021-30897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-30897" } ], "notes": [ { "category": "general", "text": "An issue existed in the specification for the resource timing API. The specification was updated and the updated specification was implemented. This issue is fixed in macOS Monterey 12.0.1. A malicious website may exfiltrate data cross-origin.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-30897", "url": "https://www.suse.com/security/cve/CVE-2021-30897" }, { "category": "external", "summary": "SUSE Bug 1194019 for CVE-2021-30897", "url": "https://bugzilla.suse.com/1194019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 15 SP2:libjavascriptcoregtk-4_0-18-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk-4_0-37-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:libwebkit2gtk3-lang-2.34.3-23.3.noarch", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk-4_0-injected-bundles-2.34.3-23.3.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:webkit2gtk3-devel-2.34.3-23.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-02-17T07:36:59Z", "details": "important" } ], "title": "CVE-2021-30897" } ] }
suse-su-2021:1990-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for webkit2gtk3", "title": "Title of the patch" }, { "category": "description", "text": "This update for webkit2gtk3 fixes the following issues:\n\n- Update to version 2.32.1:\n + Improve handling of Media Capture devices.\n + Improve WebAudio playback.\n + Improve video orientation handling.\n + Improve seeking support for MSE playback.\n + Improve flush support in EME decryptors.\n + Fix HTTP status codes for requests done through a custom URI handler.\n + Fix the Bubblewrap sandbox in certain 32-bit systems.\n + Fix inconsistencies between the WebKitWebView.is-muted property\n state and values returned by\n webkit_web_view_is_playing_audio().\n + Fix the build with ENABLE_VIDEO=OFF.\n + Fix wrong timestamps for long-lived cookies.\n + Fix UI process crash when failing to load favicons.\n + Fix several crashes and rendering issues.\n- Including Security fixes for: CVE-2021-1788, CVE-2021-1844, CVE-2021-1871,\n CVE-2020-27918, CVE-2020-29623, CVE-2021-1765, CVE-2021-1789, CVE-2021-1799,\n CVE-2021-1801, CVE-2021-1870, CVE-2020-13558, CVE-2020-13584, CVE-2020-9983, \n CVE-2020-13543, CVE-2020-9947, CVE-2020-9948, CVE-2020-9951.\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2021-1990,SUSE-2021-1990,SUSE-OpenStack-Cloud-8-2021-1990,SUSE-OpenStack-Cloud-9-2021-1990,SUSE-OpenStack-Cloud-Crowbar-8-2021-1990,SUSE-OpenStack-Cloud-Crowbar-9-2021-1990,SUSE-SLE-SAP-12-SP3-2021-1990,SUSE-SLE-SAP-12-SP4-2021-1990,SUSE-SLE-SDK-12-SP5-2021-1990,SUSE-SLE-SERVER-12-SP2-BCL-2021-1990,SUSE-SLE-SERVER-12-SP3-2021-1990,SUSE-SLE-SERVER-12-SP3-BCL-2021-1990,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1990,SUSE-SLE-SERVER-12-SP5-2021-1990", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1990-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:1990-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211990-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:1990-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" }, { "category": "self", "summary": "SUSE Bug 1177087", "url": "https://bugzilla.suse.com/1177087" }, { "category": "self", "summary": "SUSE Bug 1179122", "url": "https://bugzilla.suse.com/1179122" }, { "category": "self", "summary": "SUSE Bug 1179451", "url": "https://bugzilla.suse.com/1179451" }, { "category": "self", "summary": "SUSE Bug 1182286", "url": "https://bugzilla.suse.com/1182286" }, { "category": "self", "summary": "SUSE Bug 1184155", "url": "https://bugzilla.suse.com/1184155" }, { "category": "self", "summary": "SUSE Bug 1184262", "url": "https://bugzilla.suse.com/1184262" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13543 page", "url": "https://www.suse.com/security/cve/CVE-2020-13543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13558 page", "url": "https://www.suse.com/security/cve/CVE-2020-13558/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13584 page", "url": "https://www.suse.com/security/cve/CVE-2020-13584/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27918 page", "url": "https://www.suse.com/security/cve/CVE-2020-27918/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29623 page", "url": "https://www.suse.com/security/cve/CVE-2020-29623/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9947 page", "url": "https://www.suse.com/security/cve/CVE-2020-9947/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9948 page", "url": "https://www.suse.com/security/cve/CVE-2020-9948/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9951 page", "url": "https://www.suse.com/security/cve/CVE-2020-9951/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-9983 page", "url": "https://www.suse.com/security/cve/CVE-2020-9983/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1765 page", "url": "https://www.suse.com/security/cve/CVE-2021-1765/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1788 page", "url": "https://www.suse.com/security/cve/CVE-2021-1788/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1789 page", "url": "https://www.suse.com/security/cve/CVE-2021-1789/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1799 page", "url": "https://www.suse.com/security/cve/CVE-2021-1799/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1801 page", "url": "https://www.suse.com/security/cve/CVE-2021-1801/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1844 page", "url": "https://www.suse.com/security/cve/CVE-2021-1844/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1870 page", "url": "https://www.suse.com/security/cve/CVE-2021-1870/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-1871 page", "url": "https://www.suse.com/security/cve/CVE-2021-1871/" } ], "title": "Security update for webkit2gtk3", "tracking": { "current_release_date": "2021-06-17T07:52:17Z", "generator": { "date": "2021-06-17T07:52:17Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:1990-1", "initial_release_date": "2021-06-17T07:52:17Z", "revision_history": [ { "date": "2021-06-17T07:52:17Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64", "product_id": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64", "product": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64", "product_id": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64", "product_id": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.32.1-2.63.3.aarch64", "product": { "name": "webkit-jsc-4-2.32.1-2.63.3.aarch64", "product_id": "webkit-jsc-4-2.32.1-2.63.3.aarch64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64", "product_id": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.32.1-2.63.3.aarch64", "product": { "name": "webkit2gtk3-devel-2.32.1-2.63.3.aarch64", "product_id": "webkit2gtk3-devel-2.32.1-2.63.3.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.32.1-2.63.3.aarch64", "product": { "name": "webkit2gtk3-minibrowser-2.32.1-2.63.3.aarch64", "product_id": "webkit2gtk3-minibrowser-2.32.1-2.63.3.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-64bit-2.32.1-2.63.3.aarch64_ilp32", "product": { "name": "libjavascriptcoregtk-4_0-18-64bit-2.32.1-2.63.3.aarch64_ilp32", "product_id": "libjavascriptcoregtk-4_0-18-64bit-2.32.1-2.63.3.aarch64_ilp32" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-64bit-2.32.1-2.63.3.aarch64_ilp32", "product": { "name": "libwebkit2gtk-4_0-37-64bit-2.32.1-2.63.3.aarch64_ilp32", "product_id": "libwebkit2gtk-4_0-37-64bit-2.32.1-2.63.3.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.i586", "product": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.i586", "product_id": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.i586" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.i586", "product": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.i586", "product_id": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.i586" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.i586", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.i586", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.i586", "product": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.i586", "product_id": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.i586", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.i586", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.i586" } }, { "category": "product_version", "name": "webkit-jsc-4-2.32.1-2.63.3.i586", "product": { "name": "webkit-jsc-4-2.32.1-2.63.3.i586", "product_id": "webkit-jsc-4-2.32.1-2.63.3.i586" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.i586", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.i586", "product_id": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.i586" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.32.1-2.63.3.i586", "product": { "name": "webkit2gtk3-devel-2.32.1-2.63.3.i586", "product_id": "webkit2gtk3-devel-2.32.1-2.63.3.i586" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.32.1-2.63.3.i586", "product": { "name": "webkit2gtk3-minibrowser-2.32.1-2.63.3.i586", "product_id": "webkit2gtk3-minibrowser-2.32.1-2.63.3.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "product": { "name": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "product_id": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "product": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "product_id": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "product": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "product_id": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "product": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "product_id": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le" } }, { "category": "product_version", "name": "webkit-jsc-4-2.32.1-2.63.3.ppc64le", "product": { "name": "webkit-jsc-4-2.32.1-2.63.3.ppc64le", "product_id": "webkit-jsc-4-2.32.1-2.63.3.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "product_id": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.32.1-2.63.3.ppc64le", "product": { "name": "webkit2gtk3-devel-2.32.1-2.63.3.ppc64le", "product_id": "webkit2gtk3-devel-2.32.1-2.63.3.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.32.1-2.63.3.ppc64le", "product": { "name": "webkit2gtk3-minibrowser-2.32.1-2.63.3.ppc64le", "product_id": "webkit2gtk3-minibrowser-2.32.1-2.63.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390", "product": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390", "product_id": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390", "product": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390", "product_id": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390", "product": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390", "product_id": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390" } }, { "category": "product_version", "name": "webkit-jsc-4-2.32.1-2.63.3.s390", "product": { "name": "webkit-jsc-4-2.32.1-2.63.3.s390", "product_id": "webkit-jsc-4-2.32.1-2.63.3.s390" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390", "product_id": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.32.1-2.63.3.s390", "product": { "name": "webkit2gtk3-devel-2.32.1-2.63.3.s390", "product_id": "webkit2gtk3-devel-2.32.1-2.63.3.s390" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.32.1-2.63.3.s390", "product": { "name": "webkit2gtk3-minibrowser-2.32.1-2.63.3.s390", "product_id": "webkit2gtk3-minibrowser-2.32.1-2.63.3.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x", "product": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x", "product_id": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.1-2.63.3.s390x", "product": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.1-2.63.3.s390x", "product_id": "libjavascriptcoregtk-4_0-18-32bit-2.32.1-2.63.3.s390x" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x", "product": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x", "product_id": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-32bit-2.32.1-2.63.3.s390x", "product": { "name": "libwebkit2gtk-4_0-37-32bit-2.32.1-2.63.3.s390x", "product_id": "libwebkit2gtk-4_0-37-32bit-2.32.1-2.63.3.s390x" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x", "product": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x", "product_id": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x" } }, { "category": "product_version", "name": "webkit-jsc-4-2.32.1-2.63.3.s390x", "product": { "name": "webkit-jsc-4-2.32.1-2.63.3.s390x", "product_id": "webkit-jsc-4-2.32.1-2.63.3.s390x" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x", "product_id": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.32.1-2.63.3.s390x", "product": { "name": "webkit2gtk3-devel-2.32.1-2.63.3.s390x", "product_id": "webkit2gtk3-devel-2.32.1-2.63.3.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.32.1-2.63.3.s390x", "product": { "name": "webkit2gtk3-minibrowser-2.32.1-2.63.3.s390x", "product_id": "webkit2gtk3-minibrowser-2.32.1-2.63.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "product_id": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "product_id": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "product_id": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.1-2.63.3.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.32.1-2.63.3.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-32bit-2.32.1-2.63.3.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-32bit-2.32.1-2.63.3.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-32bit-2.32.1-2.63.3.x86_64", "product_id": "libwebkit2gtk-4_0-37-32bit-2.32.1-2.63.3.x86_64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.32.1-2.63.3.x86_64", "product": { "name": "webkit-jsc-4-2.32.1-2.63.3.x86_64", "product_id": "webkit-jsc-4-2.32.1-2.63.3.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.32.1-2.63.3.x86_64", "product": { "name": "webkit2gtk3-devel-2.32.1-2.63.3.x86_64", "product_id": "webkit2gtk3-devel-2.32.1-2.63.3.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.32.1-2.63.3.x86_64", "product": { "name": "webkit2gtk3-minibrowser-2.32.1-2.63.3.x86_64", "product_id": "webkit2gtk3-minibrowser-2.32.1-2.63.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:webkit2gtk3-devel-2.32.1-2.63.3.aarch64" }, "product_reference": "webkit2gtk3-devel-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:webkit2gtk3-devel-2.32.1-2.63.3.ppc64le" }, "product_reference": "webkit2gtk3-devel-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:webkit2gtk3-devel-2.32.1-2.63.3.s390x" }, "product_reference": "webkit2gtk3-devel-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:webkit2gtk3-devel-2.32.1-2.63.3.x86_64" }, "product_reference": "webkit2gtk3-devel-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:webkit2gtk3-devel-2.32.1-2.63.3.x86_64" }, "product_reference": "webkit2gtk3-devel-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-13543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13543" } ], "notes": [ { "category": "general", "text": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "HPE Helion OpenStack 8:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "HPE Helion OpenStack 8:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "HPE Helion OpenStack 8:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "HPE Helion OpenStack 8:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "HPE Helion OpenStack 8:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "HPE Helion OpenStack 8:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:webkit2gtk3-devel-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:webkit2gtk3-devel-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:webkit2gtk3-devel-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:webkit2gtk3-devel-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:webkit2gtk3-devel-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 8:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 8:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 8:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE OpenStack Cloud 8:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 8:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 8:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 8:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 9:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 9:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 9:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE OpenStack Cloud 9:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 9:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 9:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 9:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE OpenStack Cloud Crowbar 8:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE OpenStack Cloud Crowbar 9:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13543", "url": "https://www.suse.com/security/cve/CVE-2020-13543" }, { "category": "external", "summary": "SUSE Bug 1179451 for CVE-2020-13543", "url": "https://bugzilla.suse.com/1179451" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "HPE Helion OpenStack 8:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "HPE Helion OpenStack 8:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "HPE Helion OpenStack 8:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "HPE Helion OpenStack 8:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "HPE Helion OpenStack 8:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "HPE Helion OpenStack 8:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:webkit2gtk3-devel-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:webkit2gtk3-devel-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:webkit2gtk3-devel-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:webkit2gtk3-devel-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:webkit2gtk3-devel-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 8:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 8:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 8:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE OpenStack Cloud 8:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 8:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 8:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 8:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 9:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 9:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 9:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE OpenStack Cloud 9:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 9:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 9:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud 9:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE OpenStack Cloud Crowbar 8:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 8:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE OpenStack Cloud Crowbar 9:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE OpenStack Cloud Crowbar 9:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "HPE Helion OpenStack 8:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "HPE Helion OpenStack 8:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "HPE Helion OpenStack 8:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "HPE Helion OpenStack 8:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "HPE Helion OpenStack 8:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "HPE Helion OpenStack 8:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:webkit2gtk3-devel-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.aarch64", "SUSE Linux Enterprise Server 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.s390x", "SUSE Linux Enterprise Server 12 SP5:webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libjavascriptcoregtk-4_0-18-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk-4_0-37-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libwebkit2gtk3-lang-2.32.1-2.63.3.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:typelib-1_0-WebKit2-4_0-2.32.1-2.63.3.x8